首页 | 本学科首页   官方微博 | 高级检索  
     

Tracing Precept against Self-Protective Tortious Decoder
作者姓名:Jie  Tian  Xin-Fang  Zhang  Yi-Lin  Song  Wei  Xiang
作者单位:[1]Institute of Information Sciences and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China [2]Institute of Computing Technology, Chinese Academy of Siences, Beijing, 100080, China [3]Department of Electronics and Information Engineering, Huazhong University of Science and Technology, Wuhan, 430074, China
基金项目:This work was supported by the Large-Scale Security SoC Project of Wuhan Science and Technology Bureau of China under Grand No. 20061005119.
摘    要:Traceability precept is a broadcast encryption technique that content suppliers can trace malicious authorized users who leak the decryption key to an unauthorized user. To protect the data from eavesdropping, the content supplier encrypts the data and broadcast the cryptograph that only its subscribers can decrypt. However, a traitor may clone his decoder and sell the pirate decoders for profits. The traitor can modify the private key and the decryption program inside the pirate decoder to avoid divulging his identity. Furthermore, some traitors may fabricate a new legal private key together that cannot be traced to the creators. So in this paper, a renewed precept is proposed to achieve both revocation at a different level of capacity in each distribution and black-box tracing against self-protective pirate decoders. The rigorous mathematical deduction shows that our algorithm possess security property.

关 键 词:自我保护  解码器  预防攻击  编密码  署名用户  追踪规则
修稿时间:2006-04-062006-05-08

Tracing Precept against Self-Protective Tortious Decoder
Jie Tian Xin-Fang Zhang Yi-Lin Song Wei Xiang.Tracing Precept against Self-Protective Tortious Decoder[J].Journal of Electronic Science Technology of China,2007,5(2):115-119.
Authors:Jie Tian  Xin-Fang Zhang  Yi-Lin Song  Wei Xiang
Abstract:Traceability precept is a broadcast encryption technique that content suppliers can trace malicious authorized users who leak the decryption key to an unauthorized user. To protect the data from eavesdropping, the content supplier encrypts the data and broadcast the cryptograph that only its subscribers can decrypt. However, a traitor may clone his decoder and sell the pirate decoders for profits. The traitor can modify the private key and the decryption program inside the pirate decoder to avoid divulging his identity. Furthermore, some traitors may fabricate a new legal private key together that cannot be traced to the creators. So in this paper, a renewed precept is proposed to achieve both revocation at a different level of capacity in each distribution and black-box tracing against self-protective pirate decoders. The rigorous mathematical deduction shows that our algorithm possess security property.
Keywords:Attack prevention  broadcast encryption  Diffie-Hellman problem  malicious subscriber  tracing algorithm
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号