
新的基于中国剩余定理的公钥叛逆者追踪方案
New publickey traitor tracing schemes using chinese remainder theorem
分析了Lyuu等所提出的叛逆者追踪方案的效率和安全性,并基于中国剩余定理提出了两个改进的公钥叛逆者追踪方案。与原方案相比较,改进后的方案可以节省近一半的系统广播通信带宽,并进一步强化了方案的安全性,同时还具有良好的可撤销性和保持性等优点及黑盒子追踪功能。
An analysis of the efficiency and security of the Lyuu-Wu traitor tracing (LW02) scheme is presented, and two improved public-key traitor tracing schemes based on Chinese remainder theorem are proposed. Compared with the original scheme, the proposed schemes can save almost half of the broadcasting communication bandwidth and also enhance the security of the system. In addition, both schemes have the advantages of fast revocation and good holding properties as well as black-box tracing capability.
[1]FIAT A, NAOR M. Broadcast encryption[C]∥Proceeding of CRYPTO'93. LNCS 1109. Berlin: Springer-Verlag, 1994: 480-491.
[2]CHOR B, FIAT A, NAOR M. Tracing traitors [C]∥ Proceeding of CRYPTO'94. LNCS 839. Berlin: Springer-Verlag, 1994: 257-270.
[3]PFITZMANN B. Trials of Traced Traitors [C]∥ Advance in CRYPTO'96. LNCS 1174. Berlin: Springer-Verlag, 1996: 49-63.
[4]BONEH F M. An efficient public key traitor tracing scheme [C]∥Proceeding of CRYPT'99.LNCS 1992. Berlin: Springer-Verlag, 1999: 338-353.
[5]KIYAIAS A, YUNG M. Breaking and repairing asymmetric public-key traitor tracing [C]∥ ACM Workshop on DRM 2002.LNCS 2696. Berlin: Springer-Verlag, 2002: 32-50.
[6]CHABANNE H, PHAN D H, POINTCHEVAL D. Public traceability in traitor tracing schemes [C]∥ Advance in CRYPTO'05. LNCS 3494. Berlin: Springer-Verlag, 2005: 542-558.
[7]MCGREGOR J P, YIQUN L Y, RUBY B L. A traitor tracing scheme based on RSA for fast decryption[C]∥Proceeding of ACNS 2005.LNCS 3531.Berlin: Springer-Verlag, 2005: 56-74.
[8]LYUU Y D, WU Minglun. A fully public-key traitor tracing scheme[J]. WSEA Transaction on Circuits 1, 2002(1):88-93.
/
〈 |
|
〉 |