首页 | 本学科首页   官方微博 | 高级检索  
     

基于广播加密的对称叛逆者追踪方案分析
引用本文:齐亚莉,徐秀花.基于广播加密的对称叛逆者追踪方案分析[J].北京印刷学院学报,2011,19(4):46-50.
作者姓名:齐亚莉  徐秀花
作者单位:北京印刷学院信息与机电工程学院,北京,102600;北京印刷学院信息与机电工程学院,北京,102600
基金项目:北京市属高等学校人才强教计划资助项目(PXM2010014223095557);北京印刷学院重点项目资助(Ea2011005)
摘    要:对基于广播加密的对称叛逆者追踪方案进行了讨论与分析。结果表明:当用户数n不是太大时,对称方案具有高效、简单、安全性高的特性。在对称叛逆者追踪方案中,数字信息的解密密钥并非由用户单方面所知,而是由用户和数据发行商双方所共知。因此,数据发行商完全可以恶意使用此私有密钥,来诬陷诚实的授权用户。所以对称叛逆者方案不具备防诬陷性。针对对称方案的缺陷,研究出非对称方案。在非对称方案中,授权用户的解密密钥仅其本人知道,数据供应商一无所知,从而弥补了对称方案的可否认、可诬陷性。通过对4种具有代表性的对称叛逆者追踪方案的分析,在安全性的基础上,对其进行改进,可进一步研究出具有更多特性的叛逆者追踪方案。

关 键 词:叛逆者  广播加密  追踪  对称加密

The Analysis of Symmetric Traitor Tracing Scheme Based on Broadcast Encryption
QI Ya-li,XU Xiu-hua.The Analysis of Symmetric Traitor Tracing Scheme Based on Broadcast Encryption[J].Journal of Beijing Institute of Graphic Communication,2011,19(4):46-50.
Authors:QI Ya-li  XU Xiu-hua
Affiliation:(School of Information & Mechatronic Engineering, Beijing Institute of Graphic Communication, Beijing 102600, China)
Abstract:This paper discusses the symmetric traitor tracing scheme based on broadcast encryption. The results show that the symmetric scheme is efficient, simple and secure when the number of users is not very large. But in the symmetric scheme, data supplier generates the decryption key of the digital information and distributes it to every user. Therefore data supplier can frame the honest user. That is to say the symmetric scheme has not feature to prevent the frame behavior of the data supplier. There are some asymmetric schemes which make up the defects in the symmetric scheme, because data supplier doesn't know the users encryption key in asymmetric scheme. Based on analysis of four symmetric traitor tracing schemes, especially their security, some schemes with more characteristics will be proposed.
Keywords:traitor  broadcast encryption  tracing  symmetricencryption
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号