A multi-service oriented collusion-resistant asymmetric public-key traitor tracing scheme
J4
• Original Articles • Previous Articles Next Articles
ZHANG Xue-jun(1,2);ZENG Zhi-yong(1);ZHOU Li-hua(1)
Received:
Revised:
Online:
Published:
Abstract: The session key S is divided into a sum of S1 and S2. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special polynomial function (scheme 1). Under the condition of the discrete logarithm problem, S2 is decrypted by the Chinese Remainder Theorem(scheme 2). On the basis of a combination of scheme 1 and scheme 2, a new traitor tracing scheme is formed, which has advantages of both of them, meanwhile it overcomes their disadvantages. It has many advantages such as multi-service, collusion-resistance, asymmetry, long-lived subscriber’s key and black-box tracing.
Key words: multiple-service, collusion-resistance, asymmetric, long-lived subscriber's key, black-box tracing
CLC Number:
ZHANG Xue-jun(1;2);ZENG Zhi-yong(1);ZHOU Li-hua(1).
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://journal.xidian.edu.cn/xdxb/EN/
https://journal.xidian.edu.cn/xdxb/EN/Y2006/V33/I3/471
Cited