Computer Science ›› 2007, Vol. 34 ›› Issue (9): 80-82.
Previous Articles Next Articles
YANG Jun, ZHOU Xian-Wei (School of Information Engineering,University of Science and Technology Beijing, Beijing 100083)
Online:
Published:
Abstract: As broadcast encryption is prone to collusion attacks, traitor-tracing schemes have become an important tool for copyright protection. Using the Chinese remainder theorem Lyuu and Wu proposed an ElGamal-type broadcast encryption algorithm and a black-box
Key words: Broadcast encryption, Key management, Traitor tracing, Public-key cryptography, Group encoding
YANG Jun, ZHOU Xian-Wei (School of Information Engineering,University of Science and Technology Beijing, Beijing 100083). [J].Computer Science, 2007, 34(9): 80-82.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I9/80
Cited