A traitor tracing scheme based on RSA
J4
• Original Articles • Previous Articles Next Articles
MA Hua1;CAO Zheng-wen2
Received:
Revised:
Online:
Published:
Abstract: The traitor tracing scheme is a very useful tool for preventing piracy in the context of digital content broadcast. A traitor tracing procedure allows the data-suppliers to reveal the identities of the subscribers that were implicated in the construction of a pirate-device that illegally receives the digital content. In this paper, a traitor tracing scheme based on RS is proposed, which allows efficient deterministic traitor tracing that recovers all traitors.
Key words: traitor tracing, RSA algorithm, broadcast encryption
CLC Number:
MA Hua1;CAO Zheng-wen2.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://journal.xidian.edu.cn/xdxb/EN/
https://journal.xidian.edu.cn/xdxb/EN/Y2004/V31/I4/611
An improved traitor tracing scheme based on modified RSA
An improved dynamic traitor tracing scheme
An asymmetric public-key traitor tracing scheme against linear attack
Cited
Design of the compact 5-bit time delay line