J4
• Original Articles • Previous Articles Next Articles
ZHANG Xue-jun1,2;WANG Dong-yong3;ZENG Zhi-yong2;YIN Zhong-hai2
Received:
Revised:
Online:
Published:
Abstract: The session key S is divided into the sum of S1 and S2. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special equation(scheme 1). Under the condition of a discrete logarithm problem, S2 is decrypted by the OPE (Oblivious Polynomial Evaluation) protocol and Lagrange Interpolation Polynomial (scheme 2). On the basis of a linearly additive combination of scheme 1 and scheme 2, a new traitor tracing scheme is formed, which has advantages of both of them, and meanwhile overcomes their disadvantages. It has many advantages such as multi-service, collusion-resistance, asymmetry, black-box tracing, forward-security and backward-security, and its compositive performance is also better than those of existing ones.
Key words: multiple-service, collusion-resistance, asymmetric, black-box tracing, forward-security
CLC Number:
ZHANG Xue-jun1;2;WANG Dong-yong3;ZENG Zhi-yong2;YIN Zhong-hai2. A new traitor tracing scheme with extra properties [J].J4, 2007, 34(2): 274-278.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://journal.xidian.edu.cn/xdxb/EN/
https://journal.xidian.edu.cn/xdxb/EN/Y2007/V34/I2/274
A multi-service oriented collusion-resistant asymmetric public-key traitor tracing scheme
Cited