首页 | 本学科首页   官方微博 | 高级检索  
     

一种完整的非对称公钥叛逆者追踪方案的密码学分析与改进
引用本文:张学军. 一种完整的非对称公钥叛逆者追踪方案的密码学分析与改进[J]. 计算机应用, 2008, 28(11): 2808-2810
作者姓名:张学军
作者单位:西北师范大学教育技术与传播学院
基金项目:国家自然科学基金,中国博士后科学基金,西北师范大学校科研和教改项目项目
摘    要:王青龙等人提出了一种完整的非对称公钥叛逆者追踪方案,并称该方案具有完善的撤销性和更高的传输效率等优点。对此进行详细分析发现它存在明显缺陷,提出一种攻击方案,使得叛逆者可以进行共谋攻击,但是管理者却无法使用黑盒叛逆者追踪方法对它们进行追踪。最后提出一种改进方案,在改进方案中,叛逆者虽然仍能实施上面提到的攻击,但是会被追踪者追踪到。

关 键 词:叛逆者追踪   密码学分析   抗共谋   共谋攻击
收稿时间:2008-05-19

Cryptanalysis and improvement of complete asymmetric public-key traitor tracing scheme
ZHANG Xeu-jun. Cryptanalysis and improvement of complete asymmetric public-key traitor tracing scheme[J]. Journal of Computer Applications, 2008, 28(11): 2808-2810
Authors:ZHANG Xeu-jun
Affiliation:ZHANG Xue-jun(College of Education Technology , Communication,Northwest Normal University,Lanzhou Gansu 730070,China)
Abstract:A complete asymmetric public-key traitor tracing scheme was proposed by Wang Qing-long et al., which claimed that it had some advantages such as revoking unlimited traitors and higher transmission efficiency. The scheme and its obvious defect were carefully analyzed, and then a attack was given. And traitors can perform a collusion attack, but the manager can not trace the traitors by the black-box traitor tracing method. Finally, an improved scheme was proposed in which traitors still could play the above attack, but they can be traced.
Keywords:traitor tracing  cryptanalysis  collusion-resistant  collusion attack
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号