摘要: 提出了一种新的对称叛徒追踪方案。基于加密广播技术和Hash函数理论,构造了密钥方案、加密方案、解密方案和叛徒追踪算法,利用Chernoff界确定了系统参数值。新方案可以有效对抗加密广播业务中的共谋密钥攻击。相对于已有的CFN对称方案,新方案具有更低的个人密钥存储复杂度、用户计算复杂度和更少的数据冗余。
[1] Fiat A,Naor M.Broadcast encryption [A]∥Advance in Cryptology-CRYPTO’93[C].vol.773,Berlin,Germany:Springer-Verlag,1994:480-491 [2] Chor B,Fiat A,Naor M.Tracing traitors[A]∥Advance in Cryptology-CRYPTO’94[C].vol.839, Berlin,Germany:Sprin-ger-Verlag,1994:257-270 [3] Naor M,Pinkas B.Threshold traitor tracing [A]∥CRYPTO’98[C].vol.1462,Berlin:Springer-Verlag,1998:502-517 [4] Kurosawa K,Desmedt Y.Optimum traitor tracing and asymme-tric scheme [A]∥Advances in Cryptology-EUROCRYPT’98[C]. vol.1403,Berlin:Springer-Verlag,1998:145-157 [5] Boneh D,Franklin M.An efficient public key traitor tracingscheme [A]∥CRYPT’99[C].vol.1666,Berlin,Germany:Springer-Verlag,1999:338-353 [6] Fiat A,Tassa T.Dynamic traitor tracing [A]∥Advance inCryptology-CRYPTO’99[C].vol.1999,Berlin,Germany:Springer-Verlag,1666:354-371 [7] Safavi-Naini R,Wang Ye-jing.Squential traitor tracing [A]∥Advance in Cryptology-CRYPTO2000[C].vol.1880,Berlin,Germany:Springer-Verlag,2000:316-332 [8] Goldreich O,Goldwasser S,Micali S.How to construct random functions [J].J.Assoc.Comput,1986,33(4):792-807 [9] Mu Ning-bo,Hu Yu-pu,Ou Hai-wen.Broadcast encryption sch-emes based on RSA[J].The Journal of China Universities of Posts and Telecommunications,2009,16(1):69-75 [10] Wu Yong-dong,Deng R H.A Multi-Key Pirate Decoder against Traitor Tracing Schemes [J].Journal of Computer Science and Technology,2010,25(2):362-374 |
No related articles found! |
|