Computer Science ›› 2007, Vol. 34 ›› Issue (9): 80-82.

Previous Articles     Next Articles

YANG Jun, ZHOU Xian-Wei (School of Information Engineering,University of Science and Technology Beijing, Beijing 100083)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: As broadcast encryption is prone to collusion attacks, traitor-tracing schemes have become an important tool for copyright protection. Using the Chinese remainder theorem Lyuu and Wu proposed an ElGamal-type broadcast encryption algorithm and a black-box

Key words: Broadcast encryption, Key management, Traitor tracing, Public-key cryptography, Group encoding

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!