首页 | 官方网站   微博 | 高级检索  
     

一种新的公钥叛逆追踪方案
引用本文:滕济凯,宋宗余.一种新的公钥叛逆追踪方案[J].计算机工程与应用,2008,44(25):113-114.
作者姓名:滕济凯  宋宗余
作者单位:广州大学 数学与信息科学学院,广州 510006
摘    要:提出一种公钥叛逆追踪方案,该方案基于RSA和中国剩余定理。在该方案中,用户私钥由用户自己选择,供应商不知道用户私钥的任何信息,也就是说该方案是非对称的。有时用户可能不能共谋,而且当发现盗版的解密盒时,能够通过黑盒子追踪方法追踪到共谋者,追踪算法效率很高而且是确定型的,用户可以随时加入或退出该系统。当供应商发现非法用户时,不要求合法用户做任何改变,就能很方便地取消这些非法用户,用户和供应商都是安全的,并且用户能够确定消息来源的可靠性。

关 键 词:共谋  黑盒子追踪  叛逆追踪  
收稿时间:2007-10-29
修稿时间:2008-1-21  

New public key traitor tracing scheme
TENG Ji-kai,SONG Zong-yu.New public key traitor tracing scheme[J].Computer Engineering and Applications,2008,44(25):113-114.
Authors:TENG Ji-kai  SONG Zong-yu
Affiliation:College of Mathematic and Information Science,Guangzhou University,Guangzhou 510006,China
Abstract:In this paper,a public key traitor tracing scheme is proposed.The scheme is based on RSA and the Chinese Remainder Theorem.In this scheme,secrete keys of the receivers are chosen by themselves,the senders have no knowledge of the secret keys of the receivers,that is to say,the scheme is asymmetric.Traitors can not collude in some case.Furthermore,when pirate decoder is found,traitors can be traced by black_box tracing.The tracing algorithm is efficient and deterministic.When traitors are found,the sender can revoke them without involvement of the remaindering receivers.Both senders and receivers are safe.In addition,the receivers can verify whether the message is from correct source.
Keywords:collude  black_box tracing  traitor tracing
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号