Advanced Search
Volume 28 Issue 3
Sep.  2010
Turn off MathJax
Article Contents
Xuejie BI, Juan HUI, Anbang ZHAO, Biao WANG, Lin MA, Xiaoman LI. Underwater Target Depth Classification Method Based on Vertical Acoustic Intensity Flux[J]. Journal of Electronics & Information Technology, 2021, 43(11): 3237-3246. doi: 10.11999/JEIT201045
Citation: Wang Qing-long, Yang Bo. A Complete Asymmetric Public-Key Traitor Tracing Scheme[J]. Journal of Electronics & Information Technology, 2006, 28(3): 407-409.

A Complete Asymmetric Public-Key Traitor Tracing Scheme

  • Received Date: 2004-06-18
  • Rev Recd Date: 2005-10-17
  • Publish Date: 2006-03-19
  • Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme. Compared with the previous schemes, this proposed scheme can accurately determine a or all traitor(s) from an illegal decoder by full black-box tracing when the number of traitors participating conspiracy is not larger than the defined number; and revoke unlimited traitors by means of the way of updating secret key. Moreover, this proposed scheme greatly decreases the computational cost of tracing a traitor and has a higher transmission efficiency compared with those of available.
  • Chor B.[J].Fiat A, Naor M. Tracing traitors[A]. Advances in Cryptology-CRYPTO94 [C], Berlin:Springer-Verlag.1994,:-[2]Boneh D.[J].Franklin M. An efficient public key traitor tracing scheme[A]. Proc of CRYPTO99[C]. Berlin: Sprinber-Verlag.1999,:-[3]Pfitzmann B. Trails of traced traitors[A]. Proc of Information Hiding96[C]. Berlin : Springer-Verlag, 1996: 49-64.[4]Aggelos Kiayias, Moti Yung. Breaking and repairing asymmetric public-key traitor tracing[A].Digital Rights Management: revised papers. Washington, DC, USA, November 18, 2002. BerlinSpringer-Verlag, 2003: 32-50.[5]Yuji Watanabe, Goichiro Hanaoka, Hideki Imal. Efficient asymmetric public-key traitor tracing without trusted agents [A],Topics in Cryptology-CT-RSA 2001 [C]. San Francisco, CA, USA, April 8-12, 200Berlin: Springer-Verlag, 2001: 392-407.[6]Naor M. Pinkas B. Oblivious transfer and polynomial evaluation [A]. In Proc of STOC'99[C], 1999: 245-254.[7]Kurosawa K.[J].Desmedt Y. Optimum traitor tracing and asymmetric scheme [A]. Proc of EUROCRYPTO98[C] . Berlin : Springer-Verlag.1998,:-
  • Cited by

    Periodical cited type(6)

    1. 姜文涛,李宛宣,张晟翀. 非线性时间一致性的相关滤波目标跟踪. 计算机应用. 2024(08): 2558-2570 .
    2. 张博. 基于残差神经网络的目标运动边界视觉快速跟踪算法. 探测与控制学报. 2023(03): 37-42+50 .
    3. 姜文涛,孟庆姣. 自适应时空正则化的相关滤波目标跟踪. 智能系统学报. 2023(04): 754-763 .
    4. 姜文涛,徐晓晴. 强化前景感知的相关滤波目标跟踪. 计算机科学与探索. 2023(10): 2462-2477 .
    5. 孟庆姣,姜文涛. 多特征感知的时空自适应相关滤波目标跟踪. 计算机科学. 2023(S2): 203-211 .
    6. 张天晴,刘明华,何博,邵洪波. 基于多注意力融合的抗遮挡目标跟踪. 青岛科技大学学报(自然科学版). 2023(06): 110-118 .

    Other cited types(3)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2212) PDF downloads(747) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return