Wang Qing-long, Yang Bo. A Complete Asymmetric Public-Key Traitor Tracing Scheme[J]. Journal of Electronics & Information Technology, 2006, 28(3): 407-409.
Citation:
Wang Qing-long, Yang Bo. A Complete Asymmetric Public-Key Traitor Tracing Scheme[J]. Journal of Electronics & Information Technology, 2006, 28(3): 407-409.
Wang Qing-long, Yang Bo. A Complete Asymmetric Public-Key Traitor Tracing Scheme[J]. Journal of Electronics & Information Technology, 2006, 28(3): 407-409.
Citation:
Wang Qing-long, Yang Bo. A Complete Asymmetric Public-Key Traitor Tracing Scheme[J]. Journal of Electronics & Information Technology, 2006, 28(3): 407-409.
Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme. Compared with the previous schemes, this proposed scheme can accurately determine a or all traitor(s) from an illegal decoder by full black-box tracing when the number of traitors participating conspiracy is not larger than the defined number; and revoke unlimited traitors by means of the way of updating secret key. Moreover, this proposed scheme greatly decreases the computational cost of tracing a traitor and has a higher transmission efficiency compared with those of available.
Chor B.[J].Fiat A, Naor M. Tracing traitors[A]. Advances in Cryptology-CRYPTO94 [C], Berlin:Springer-Verlag.1994,:-[2]Boneh D.[J].Franklin M. An efficient public key traitor tracing scheme[A]. Proc of CRYPTO99[C]. Berlin: Sprinber-Verlag.1999,:-[3]Pfitzmann B. Trails of traced traitors[A]. Proc of Information Hiding96[C]. Berlin : Springer-Verlag, 1996: 49-64.[4]Aggelos Kiayias, Moti Yung. Breaking and repairing asymmetric public-key traitor tracing[A].Digital Rights Management: revised papers. Washington, DC, USA, November 18, 2002. BerlinSpringer-Verlag, 2003: 32-50.[5]Yuji Watanabe, Goichiro Hanaoka, Hideki Imal. Efficient asymmetric public-key traitor tracing without trusted agents [A],Topics in Cryptology-CT-RSA 2001 [C]. San Francisco, CA, USA, April 8-12, 200Berlin: Springer-Verlag, 2001: 392-407.[6]Naor M. Pinkas B. Oblivious transfer and polynomial evaluation [A]. In Proc of STOC'99[C], 1999: 245-254.[7]Kurosawa K.[J].Desmedt Y. Optimum traitor tracing and asymmetric scheme [A]. Proc of EUROCRYPTO98[C] . Berlin : Springer-Verlag.1998,:-