一种匿名的公钥叛逆者追踪方案  

An Anonymous Public Key Traitor Tracing Scheme

在线阅读下载全文

作  者:韩露露[1] 何少芳[1] 贺雅楠[1] 李春[1] 伍晨迪 HAN Lulu HE Shaofang HE Yanan LI Chun WU Chendi(College of Science, Hunan Agricultural University, Changsha Hunan 410128, China)

机构地区:[1]湖南农业大学理学院,湖南长沙410128

出  处:《长沙大学学报》2016年第5期62-65,共4页Journal of Changsha University

基  金:湖南农业大学大学生创新性实验计划项目(批准号:XCX1572)

摘  要:针对离散对数困难问题,提出一种匿名的公钥叛逆者追踪方案.该方案通过多项式与过滤函数来构建,能够在不更新其他合法用户私钥的前提下,实现完全撤销多个叛逆者或者完全恢复已撤销用户.当缴获盗版解码器时,只需通过一次输入输出即可确定叛逆者.由性能分析可知,该方案不仅具有用户的匿名安全性、不可否认性、完全撤销与恢复以及黑盒追踪的特点,还满足完全抗共谋性与抗线性组合攻击.Based on the discrete log representation problem,an anonymous public key traitor tracing scheme is presented in this paper.This scheme employs the polynomial function and the filter function as the basic means of constructing the traitor tracing procedures,and it can safely revoke or recover the private keys of traitors without updating the private keys of other receivers. When a pirate decoder is confiscated,it only requires single input and output to decide the traitor. The analysis of performance shows that the proposed scheme has many advantages,such as anonymous safety of users,non- repudiation,full revocability,black- box traceability and full recoverability. Moreover,the scheme is able to achieve full collusion resistance and anti- linear- attack.

关 键 词:离散对数问题 叛逆者追踪 完全撤销性 完全可恢复性 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象