›› 2016, Vol. 29 ›› Issue (6): 44-.

• Articles • Previous Articles     Next Articles

Anonymous Traitor Tracing Scheme Based on EIGamal Encryption Algorithm

HE Shaofang   

  1. (Science College, Hunan Agricultural University,Changsha 410128,China)
  • Online:2016-06-15 Published:2016-06-22

Abstract:

Based on the cryptosystem of EIGamal, an anonymous traitor tracing scheme is presented in this paper. In the scheme, information use symmetric encryption and is broadcasted to legitimate users, and the session key is sent to users through the header produced by datasupplier after register users has been tested and verified. The analysis of performance show that the scheme not only has many advantages, such as anonymous safety of users, nonrepudiation, full frameproof, revocability, recoverability, but also is able to achieve antilinearattack.

Key words: EIGamal encryption algorithm, traitor tracing, revocability, recoverability, anonymous

CLC Number: 

  • TP393.08