Computer Science ›› 2011, Vol. 38 ›› Issue (2): 106-109.
Previous Articles Next Articles
WANG Qing-long,ZHANG Shao-bo
Online:
Published:
Abstract: A new k-resilient publi}key traitor tracing scheme was proposed. A traitor in this scheme can be traced by the way of public black-box tracing mean. Meanwhile, our scheme is provably secure against adaptive chosen ciphertext attack assume that DDH problem is difficulty. Our scheme remains CCA2-secure when not more than k traitors arc reyoked. Compared with similar schemes,our scheme does not use one-time message authentication code assumption and reduces the tracing complexity greatly. Further, our scheme satisfies asymmetry.
Key words: Traitor tracing, Broadcast encryption, MAC, Provable security, Asymmetry
WANG Qing-long,ZHANG Shao-bo. Public Traceable Traitor Tracing Scheme Secure against CCA2[J].Computer Science, 2011, 38(2): 106-109.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2011/V38/I2/106
Cited