Advanced Search
Volume 28 Issue 3
Sep.  2010
Turn off MathJax
Article Contents
Wang Qing-long, Yang Bo. A Complete Asymmetric Public-Key Traitor Tracing Scheme[J]. Journal of Electronics & Information Technology, 2006, 28(3): 407-409.
Citation: Wang Qing-long, Yang Bo. A Complete Asymmetric Public-Key Traitor Tracing Scheme[J]. Journal of Electronics & Information Technology, 2006, 28(3): 407-409.

A Complete Asymmetric Public-Key Traitor Tracing Scheme

  • Received Date: 2004-06-18
  • Rev Recd Date: 2005-10-17
  • Publish Date: 2006-03-19
  • Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme. Compared with the previous schemes, this proposed scheme can accurately determine a or all traitor(s) from an illegal decoder by full black-box tracing when the number of traitors participating conspiracy is not larger than the defined number; and revoke unlimited traitors by means of the way of updating secret key. Moreover, this proposed scheme greatly decreases the computational cost of tracing a traitor and has a higher transmission efficiency compared with those of available.
  • loading
  • Chor B.[J].Fiat A, Naor M. Tracing traitors[A]. Advances in Cryptology-CRYPTO94 [C], Berlin:Springer-Verlag.1994,:-[2]Boneh D.[J].Franklin M. An efficient public key traitor tracing scheme[A]. Proc of CRYPTO99[C]. Berlin: Sprinber-Verlag.1999,:-[3]Pfitzmann B. Trails of traced traitors[A]. Proc of Information Hiding96[C]. Berlin : Springer-Verlag, 1996: 49-64.[4]Aggelos Kiayias, Moti Yung. Breaking and repairing asymmetric public-key traitor tracing[A].Digital Rights Management: revised papers. Washington, DC, USA, November 18, 2002. BerlinSpringer-Verlag, 2003: 32-50.[5]Yuji Watanabe, Goichiro Hanaoka, Hideki Imal. Efficient asymmetric public-key traitor tracing without trusted agents [A],Topics in Cryptology-CT-RSA 2001 [C]. San Francisco, CA, USA, April 8-12, 200Berlin: Springer-Verlag, 2001: 392-407.[6]Naor M. Pinkas B. Oblivious transfer and polynomial evaluation [A]. In Proc of STOC'99[C], 1999: 245-254.[7]Kurosawa K.[J].Desmedt Y. Optimum traitor tracing and asymmetric scheme [A]. Proc of EUROCRYPTO98[C] . Berlin : Springer-Verlag.1998,:-
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2199) PDF downloads(747) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return