计算机科学 ›› 2013, Vol. 40 ›› Issue (8): 96-99.

• 信息安全 • 上一篇    下一篇

三级对称叛徒追踪新方案

苏加军,王新梅   

  1. 西安电子科技大学综合业务网国家重点实验室 西安710071;西安电子科技大学综合业务网国家重点实验室 西安710071
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家973计划项目(2012CB316103)资助

New Three-level Symmetry Scheme of Traitor Tracing

SU Jia-jun and WANG Xin-mei   

  • Online:2018-11-16 Published:2018-11-16

摘要: 提出了一种新的对称叛徒追踪方案。基于加密广播技术和Hash函数理论,构造了密钥方案、加密方案、解密方案和叛徒追踪算法,利用Chernoff界确定了系统参数值。新方案可以有效对抗加密广播业务中的共谋密钥攻击。相对于已有的CFN对称方案,新方案具有更低的个人密钥存储复杂度、用户计算复杂度和更少的数据冗余。

关键词: 加密广播,叛徒追踪,共谋密钥攻击,Chernoff界,Hash函数

Abstract: This paper presented a new symmetry scheme of traitor tracing.Based on the broadcast encryption techniques and Hash function theory,the corresponding key scheme,encryption scheme,decryption scheme and traitor tracing algorithm were constructed in this paper.The proper values of system parameters were obtained by the Chernoff bound.The scheme in this paper has the advantages of lower storing complexity of personal key,lower user computing complexity and less data redundancy than existing CFN symmetry schemes and it can efficiently combat against the collusion key attack in the broadcast encryption.

Key words: Broadcast encryption,Traitor tracing,Collusion key attack,Chernoff bound,Hash function

[1] Fiat A,Naor M.Broadcast encryption [A]∥Advance in Cryptology-CRYPTO’93[C].vol.773,Berlin,Germany:Springer-Verlag,1994:480-491
[2] Chor B,Fiat A,Naor M.Tracing traitors[A]∥Advance in Cryptology-CRYPTO’94[C].vol.839, Berlin,Germany:Sprin-ger-Verlag,1994:257-270
[3] Naor M,Pinkas B.Threshold traitor tracing [A]∥CRYPTO’98[C].vol.1462,Berlin:Springer-Verlag,1998:502-517
[4] Kurosawa K,Desmedt Y.Optimum traitor tracing and asymme-tric scheme [A]∥Advances in Cryptology-EUROCRYPT’98[C]. vol.1403,Berlin:Springer-Verlag,1998:145-157
[5] Boneh D,Franklin M.An efficient public key traitor tracingscheme [A]∥CRYPT’99[C].vol.1666,Berlin,Germany:Springer-Verlag,1999:338-353
[6] Fiat A,Tassa T.Dynamic traitor tracing [A]∥Advance inCryptology-CRYPTO’99[C].vol.1999,Berlin,Germany:Springer-Verlag,1666:354-371
[7] Safavi-Naini R,Wang Ye-jing.Squential traitor tracing [A]∥Advance in Cryptology-CRYPTO2000[C].vol.1880,Berlin,Germany:Springer-Verlag,2000:316-332
[8] Goldreich O,Goldwasser S,Micali S.How to construct random functions [J].J.Assoc.Comput,1986,33(4):792-807
[9] Mu Ning-bo,Hu Yu-pu,Ou Hai-wen.Broadcast encryption sch-emes based on RSA[J].The Journal of China Universities of Posts and Telecommunications,2009,16(1):69-75
[10] Wu Yong-dong,Deng R H.A Multi-Key Pirate Decoder against Traitor Tracing Schemes [J].Journal of Computer Science and Technology,2010,25(2):362-374

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!