Computer Engineering and Applications ›› 2007, Vol. 43 ›› Issue (23): 155-156.

• 网络、通信与安全 • Previous Articles     Next Articles

Traitor tracing scheme with public traceability

LI Xue-yuan,WANG Xin-mei   

  1. State Key Laboratory of Integrated Service Networks,Xidian University,Xi’an 710071,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-08-11 Published:2007-08-11
  • Contact: LI Xue-yuan

一个具有可公开追踪性的叛逆者追踪方案

李学远,王新梅   

  1. 西安电子科技大学 综合业务网国家重点实验室,西安 710071

  • 通讯作者: 李学远

Abstract: Traitor tracing schemes play an important role for secure distribution of digital content.Based on DDH(Decision Diffie-Hellman) assumption and the idea that users choose their personal secret keys and compute their personal public keys,the system utilizes users’ personal public keys to trace traitors,this paper presents a fully public-key asymmetric traitor tracing scheme with public traceability.The scheme can delegate the tracing capability to anyone(trusted or untrusted) and revoke or add a user without updating other users’ secret keys,has some other properties such as anonymity and black-box tracing.

Key words: traitor tracing, DDH assumption, public traceability, black-box tracing

摘要: 广播加密系统中,叛逆者追踪方案起着防止数据盗版的重要作用。基于DDH(Decision Diffie-Hellman)假设,采用用户选择个人密钥并由此计算个人公钥,系统利用用户个人公钥来追踪识别叛逆者的思想,提出一个具有可公开追踪性的完全公钥非对称叛逆者追踪方案。该方案可将追踪过程交给任何信任或不信任的人,能撤销或添加用户而不需更新用户的个人密钥,同时,还具有匿名性、黑盒子追踪等特点。

关键词: 叛逆者追踪, DDH假设, 可公开追踪性, 黑盒子追踪