J4

• Original Articles • Previous Articles     Next Articles

A multi-service oriented collusion-resistant asymmetric public-key traitor tracing scheme

ZHANG Xue-jun(1,2);ZENG Zhi-yong(1);ZHOU Li-hua(1)

  

  1. (1) Ministry of Edu. Key Lab. of Computer Network and Info. Security, Xidian Univ., Xi′an 710071, China
    (2) School of Edu. Tech. and Comm., North West Normal Univ., Lanzhou 730070, China
  • Received:1900-01-01 Revised:1900-01-01 Online:2006-06-20 Published:2006-06-20

Abstract: The session key S is divided into a sum of S1 and S2. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special polynomial function (scheme 1). Under the condition of the discrete logarithm problem, S2 is decrypted by the Chinese Remainder Theorem(scheme 2). On the basis of a combination of scheme 1 and scheme 2, a new traitor tracing scheme is formed, which has advantages of both of them, meanwhile it overcomes their disadvantages. It has many advantages such as multi-service, collusion-resistance, asymmetry, long-lived subscriber’s key and black-box tracing.

Key words: multiple-service, collusion-resistance, asymmetric, long-lived subscriber's key, black-box tracing

CLC Number: 

  • TN918