J4

• Original Articles • Previous Articles     Next Articles

An asymmetric public-key traitor tracing scheme against linear attack

YU Zhi-qiang;YANG Bo

  

  1. (Ministry of Education Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China)
  • Received:1900-01-01 Revised:1900-01-01 Online:2004-12-20 Published:2004-12-20

Abstract: A public-key traitor tracking scheme against linear combination(convex combination) attack is presented, which makes use of the oblivious polynomial evaluation protocol in the secret key negotiation process to achieve to asymmetric tracking ability and properties of direct non-repudiation, full frqmeproof. In addition, all the traitors can be determined by overwhelming probobility in our scheme. Furthermore, any information on the decreption key of users will not be involved in broadcasting data products, and compared with current schemes, security is improved.

Key words: traitor tracing, convex combination, direct non-repudiation, full frqmeproof

CLC Number: 

  • TP911.22