Computer Science ›› 2013, Vol. 40 ›› Issue (8): 96-99.

Previous Articles     Next Articles

New Three-level Symmetry Scheme of Traitor Tracing

SU Jia-jun and WANG Xin-mei   

  • Online:2018-11-16 Published:2018-11-16

Abstract: This paper presented a new symmetry scheme of traitor tracing.Based on the broadcast encryption techniques and Hash function theory,the corresponding key scheme,encryption scheme,decryption scheme and traitor tracing algorithm were constructed in this paper.The proper values of system parameters were obtained by the Chernoff bound.The scheme in this paper has the advantages of lower storing complexity of personal key,lower user computing complexity and less data redundancy than existing CFN symmetry schemes and it can efficiently combat against the collusion key attack in the broadcast encryption.

Key words: Broadcast encryption,Traitor tracing,Collusion key attack,Chernoff bound,Hash function

[1] Fiat A,Naor M.Broadcast encryption [A]∥Advance in Cryptology-CRYPTO’93[C].vol.773,Berlin,Germany:Springer-Verlag,1994:480-491
[2] Chor B,Fiat A,Naor M.Tracing traitors[A]∥Advance in Cryptology-CRYPTO’94[C].vol.839, Berlin,Germany:Sprin-ger-Verlag,1994:257-270
[3] Naor M,Pinkas B.Threshold traitor tracing [A]∥CRYPTO’98[C].vol.1462,Berlin:Springer-Verlag,1998:502-517
[4] Kurosawa K,Desmedt Y.Optimum traitor tracing and asymme-tric scheme [A]∥Advances in Cryptology-EUROCRYPT’98[C]. vol.1403,Berlin:Springer-Verlag,1998:145-157
[5] Boneh D,Franklin M.An efficient public key traitor tracingscheme [A]∥CRYPT’99[C].vol.1666,Berlin,Germany:Springer-Verlag,1999:338-353
[6] Fiat A,Tassa T.Dynamic traitor tracing [A]∥Advance inCryptology-CRYPTO’99[C].vol.1999,Berlin,Germany:Springer-Verlag,1666:354-371
[7] Safavi-Naini R,Wang Ye-jing.Squential traitor tracing [A]∥Advance in Cryptology-CRYPTO2000[C].vol.1880,Berlin,Germany:Springer-Verlag,2000:316-332
[8] Goldreich O,Goldwasser S,Micali S.How to construct random functions [J].J.Assoc.Comput,1986,33(4):792-807
[9] Mu Ning-bo,Hu Yu-pu,Ou Hai-wen.Broadcast encryption sch-emes based on RSA[J].The Journal of China Universities of Posts and Telecommunications,2009,16(1):69-75
[10] Wu Yong-dong,Deng R H.A Multi-Key Pirate Decoder against Traitor Tracing Schemes [J].Journal of Computer Science and Technology,2010,25(2):362-374

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!