一种完整的非对称公钥叛逆者追踪方案
A Complete Asymmetric Public-Key Traitor Tracing Scheme
-
摘要: 利用不经意多项式估值协议,该文提出了一种新的非对称公钥叛逆者追踪方案。当参与共谋的叛逆者数量不超过预先设置的范围时,与现有的非对称公钥追踪方案相比,该方案能够以完全的黑盒子追踪方式准确地确定出全部叛逆者;借助于密钥更新,该方案具有完善的撤销性,能够撤销任意数量的叛逆者。此外,与已有方案相比该方案显著降低了追踪时的计算量并且有着更高的传输效率。Abstract: Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme. Compared with the previous schemes, this proposed scheme can accurately determine a or all traitor(s) from an illegal decoder by full black-box tracing when the number of traitors participating conspiracy is not larger than the defined number; and revoke unlimited traitors by means of the way of updating secret key. Moreover, this proposed scheme greatly decreases the computational cost of tracing a traitor and has a higher transmission efficiency compared with those of available.
-
Chor B.[J].Fiat A, Naor M. Tracing traitors[A]. Advances in Cryptology-CRYPTO94 [C], Berlin:Springer-Verlag.1994,:-[2]Boneh D.[J].Franklin M. An efficient public key traitor tracing scheme[A]. Proc of CRYPTO99[C]. Berlin: Sprinber-Verlag.1999,:-[3]Pfitzmann B. Trails of traced traitors[A]. Proc of Information Hiding96[C]. Berlin : Springer-Verlag, 1996: 49-64.[4]Aggelos Kiayias, Moti Yung. Breaking and repairing asymmetric public-key traitor tracing[A].Digital Rights Management: revised papers. Washington, DC, USA, November 18, 2002. BerlinSpringer-Verlag, 2003: 32-50.[5]Yuji Watanabe, Goichiro Hanaoka, Hideki Imal. Efficient asymmetric public-key traitor tracing without trusted agents [A],Topics in Cryptology-CT-RSA 2001 [C]. San Francisco, CA, USA, April 8-12, 200Berlin: Springer-Verlag, 2001: 392-407.[6]Naor M. Pinkas B. Oblivious transfer and polynomial evaluation [A]. In Proc of STOC'99[C], 1999: 245-254.[7]Kurosawa K.[J].Desmedt Y. Optimum traitor tracing and asymmetric scheme [A]. Proc of EUROCRYPTO98[C] . Berlin : Springer-Verlag.1998,:-
计量
- 文章访问数: 2201
- HTML全文浏览量: 86
- PDF下载量: 747
- 被引次数: 0