J4

• Original Articles • Previous Articles     Next Articles

A new traitor tracing scheme with extra properties

ZHANG Xue-jun1,2;WANG Dong-yong3;ZENG Zhi-yong2;YIN Zhong-hai2
  

  1. (1. School of Edu. Tech. and Comm., North West Normal Univ., Lanzhou 730070, China; 2. Ministry of Edu. Key Lab. of Computer Network and Info. Security, Xidian Univ., Xi′an 710071, China; 3. Dept. of Science, Tsinghua Univ., Beijing 100084, China)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-04-20 Published:2007-04-20

Abstract: The session key S is divided into the sum of S1 and S2. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special equation(scheme 1). Under the condition of a discrete logarithm problem, S2 is decrypted by the OPE (Oblivious Polynomial Evaluation) protocol and Lagrange Interpolation Polynomial (scheme 2). On the basis of a linearly additive combination of scheme 1 and scheme 2, a new traitor tracing scheme is formed, which has advantages of both of them, and meanwhile overcomes their disadvantages. It has many advantages such as multi-service, collusion-resistance, asymmetry, black-box tracing, forward-security and backward-security, and its compositive performance is also better than those of existing ones.

Key words: multiple-service, collusion-resistance, asymmetric, black-box tracing, forward-security

CLC Number: 

  • TN918