计算机科学 ›› 2011, Vol. 38 ›› Issue (2): 106-109.

• 计算机网络与信息安全 • 上一篇    下一篇

公开追踪和CCA2安全的叛逆者追踪方案

王青龙,张少博   

  1. (长安大学信息工程学院 西安710064)(北京交通大学通信与信息系统北京市重点实验室 北京100044)
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(60773175),中央高校基本科研业务费专项基金(CHD2009JC146) ,长安大学基础研究支持计划专项基金资助。

Public Traceable Traitor Tracing Scheme Secure against CCA2

WANG Qing-long,ZHANG Shao-bo   

  • Online:2018-11-16 Published:2018-11-16

摘要: 提出一种新的k-resilient公钥叛逆者追踪方案。方案的追踪方式为公开黑盒追踪。假设DDH问题为困难问题,则方案能被证明是自适应选择密文攻击安全的,并且在撤销不超过k个叛逆者条件下仍然是自适应选择密文攻击安全的。与同类方案相比,该方案没有使用一次性消息认证码假设,并且有效降低了追踪时的计算复杂性。另外,方案满足非对称性。

关键词: 叛逆者追踪,广播加密,消息认证码,可证明安全性,非对称性

Abstract: A new k-resilient publi}key traitor tracing scheme was proposed. A traitor in this scheme can be traced by the way of public black-box tracing mean. Meanwhile, our scheme is provably secure against adaptive chosen ciphertext attack assume that DDH problem is difficulty. Our scheme remains CCA2-secure when not more than k traitors arc reyoked. Compared with similar schemes,our scheme does not use one-time message authentication code assumption and reduces the tracing complexity greatly. Further, our scheme satisfies asymmetry.

Key words: Traitor tracing, Broadcast encryption, MAC, Provable security, Asymmetry

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!