新的基于中国剩余定理的公钥叛逆者追踪方案

杨晨; 马文平; 王新梅

北京化工大学学报(自然科学版) ›› 2007, Vol. 34 ›› Issue (1) : 98-101.

PDF(147 KB)
欢迎访问北京化工大学学报(自然科学版),今天是 2025年4月4日 星期五
Email Alert  RSS
PDF(147 KB)
北京化工大学学报(自然科学版) ›› 2007, Vol. 34 ›› Issue (1) : 98-101.
研究简报

新的基于中国剩余定理的公钥叛逆者追踪方案

  • 杨晨; 马文平; 王新梅
作者信息 +

New publickey traitor tracing schemes using chinese remainder theorem

  • YANG Chen; MA WenPing; WANG XinMei
Author information +
文章历史 +

摘要

分析了Lyuu等所提出的叛逆者追踪方案的效率和安全性,并基于中国剩余定理提出了两个改进的公钥叛逆者追踪方案。与原方案相比较,改进后的方案可以节省近一半的系统广播通信带宽,并进一步强化了方案的安全性,同时还具有良好的可撤销性和保持性等优点及黑盒子追踪功能。

Abstract

An analysis of the efficiency and security of the Lyuu-Wu traitor tracing (LW02) scheme is presented, and two improved public-key traitor tracing schemes based on Chinese remainder theorem are proposed. Compared with the original scheme, the proposed schemes can save almost half of the broadcasting communication bandwidth and also enhance the security of the system. In addition, both schemes have the advantages of fast revocation and good holding properties as well as black-box tracing capability.

引用本文

导出引用
杨晨; 马文平; 王新梅. 新的基于中国剩余定理的公钥叛逆者追踪方案[J]. 北京化工大学学报(自然科学版), 2007, 34(1): 98-101
YANG Chen; MA WenPing; WANG XinMei. New publickey traitor tracing schemes using chinese remainder theorem[J]. Journal of Beijing University of Chemical Technology, 2007, 34(1): 98-101

参考文献

[1]FIAT A, NAOR M. Broadcast encryption[C]∥Proceeding of CRYPTO'93. LNCS 1109. Berlin: Springer-Verlag, 1994: 480-491.
[2]CHOR B, FIAT A, NAOR M. Tracing traitors [C]∥ Proceeding of CRYPTO
'94. LNCS 839. Berlin: Springer-Verlag, 1994: 257-270.
[3]PFITZMANN B. Trials of Traced Traitors [C]∥ Advance in CRYPTO'96.
LNCS 1174. Berlin: Springer-Verlag, 1996: 49-63.
[4]BONEH F M. An efficient public key traitor tracing scheme [C]∥Proc
eeding of CRYPT'99.LNCS 1992. Berlin: Springer-Verlag, 1999: 338-353.
[5]KIYAIAS A, YUNG M. Breaking and repairing asymmetric public-key trai
tor tracing [C]∥ ACM Workshop on DRM 2002.LNCS 2696. Berlin: Springer-Verlag, 2002: 32-50.
[6]CHABANNE H, PHAN D H, POINTCHEVAL D. Public traceability in traitor t
racing schemes [C]∥ Advance in CRYPTO'05. LNCS 3494. Berlin: Springer-Verlag, 2005: 542-558.
[7]MCGREGOR J P, YIQUN L Y, RUBY B L. A traitor tracing scheme based on
RSA for fast decryption[C]∥Proceeding of ACNS 2005.LNCS 3531.Berlin: Springer-Verlag, 2005: 56-74.
[8]LYUU Y D, WU Minglun. A fully public-key traitor tracing scheme[J]
. WSEA Transaction on Circuits 1, 2002(1):88-93.

PDF(147 KB)

4170

Accesses

0

Citation

Detail

段落导航
相关文章

/