›› 2016, Vol. 29 ›› Issue (6): 44-.
• Articles • Previous Articles Next Articles
HE Shaofang
Online:
Published:
Abstract:
Based on the cryptosystem of EIGamal, an anonymous traitor tracing scheme is presented in this paper. In the scheme, information use symmetric encryption and is broadcasted to legitimate users, and the session key is sent to users through the header produced by datasupplier after register users has been tested and verified. The analysis of performance show that the scheme not only has many advantages, such as anonymous safety of users, nonrepudiation, full frameproof, revocability, recoverability, but also is able to achieve antilinearattack.
Key words: EIGamal encryption algorithm, traitor tracing, revocability, recoverability, anonymous
CLC Number:
HE Shaofang. Anonymous Traitor Tracing Scheme Based on EIGamal Encryption Algorithm[J]., 2016, 29(6): 44-.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://journal.xidian.edu.cn/dzkj/EN/
https://journal.xidian.edu.cn/dzkj/EN/Y2016/V29/I6/44
Cited