期刊文献+

一种容忍入侵的基于代理的叛徒追踪方案

An Intrusion-tolerant Agent Based Traitor Tracing Scheme
在线阅读 下载PDF
导出
摘要 基于离散对数困难问题提出了一种新的容忍入侵的基于代理的叛徒追踪方案,详细地分析了方案的完备性和安全性。该方案能够在数据内容提供商及单个或多个代理不可信的情况下保证合法授权用户的安全性。 A new intrusion-tolerant agent based traitor tracing scheme based on the assumption that solving the discrete logarithm problem is presented, and the completeness and security analysis of the scheme is given in detail. The proposed scheme ensures the security of the legal authorized users in the case of that the digital providers and one or more agents are not trusted.
作者 周敏 杨晨
出处 《计算机与数字工程》 2009年第12期83-85,共3页 Computer & Digital Engineering
基金 国家自然科学基金项目(编号:60773002)资助
关键词 叛徒追踪 离散对数 广播加密 安全 traitor tracing, discrete logarithm, broadcast encryption, security
  • 相关文献

参考文献11

  • 1A. Fiat, M. Naor. Broadcast encryption. Advance in Cryptology CRYPTO'93[C]. Berlin: Springer-Verlag, 1994,773:480-491.
  • 2B. Chor, A. Fiat, M. Naor. Tracing traitors. Advance in Cryptology-CRYPTO'94[C]. Berlin: Springer-Verlag, 1994,839 : 257 - 270.
  • 3Fiat, T. Tassa. Dynamic traitor tracing. Advance in Cryptology-CRYPTO'99[C]. Berlin: Springer-Verlag, 1999,1666:354-371.
  • 4K. Kurosawa, Y. Desmedt. Optimum traitor tracing and asymmetric scheme. Advances in Cryptology -EUROCRYPT'98[C]. Berlin: Springer-Verlag, 1998: 145-157.
  • 5T. P. Pedersen. A Threshold Cryptosystem Without a Trusted Party. Eurocrypt'91[C]. Berlin: Springer-Verlag, 1991 : 522-526.
  • 6D. Boneh, M. Franklin. An efficient public key traitor tracing scheme. CRYPT'99[C]. Berlin: Springer- Verlag, 1999 : 338-353.
  • 7H. Chabanne, D. H. Phan, D. Pointcheval. Public traceability in traitor tracing schemes. Advances in CRYPTO'05 LNCS[C]. Springe&Verlag, 2005,3494:542 -558.
  • 8W. Tzeng, Z. Tzeng. A public-key traitor tracing scheme with revocation using dynamic shares[C]. In proc. of PKC 2001. LNCS, Springer-Verlag, 2001,1992: 207-224.
  • 9A. Kiyaias, M. Yung. Breaking and repairing asymmetric public-key traitor tracing[C]. In proc. of ACM Workshop on DRM 2002, LNCS, Springer-Verlag, 2002, 2696:32-50.
  • 10K. McCurley. The discrete logarithm problem, in Cryptography and Computational Number Theory[C]. C. Pomerance, ed., Proc. Symp. Appl. Math. 42, Amer. Math. Soc. ,1990:49-74.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部