An asymmetric public-key traitor tracing scheme against linear attack
J4
• Original Articles • Previous Articles Next Articles
YU Zhi-qiang;YANG Bo
Received:
Revised:
Online:
Published:
Abstract: A public-key traitor tracking scheme against linear combination(convex combination) attack is presented, which makes use of the oblivious polynomial evaluation protocol in the secret key negotiation process to achieve to asymmetric tracking ability and properties of direct non-repudiation, full frqmeproof. In addition, all the traitors can be determined by overwhelming probobility in our scheme. Furthermore, any information on the decreption key of users will not be involved in broadcasting data products, and compared with current schemes, security is improved.
Key words: traitor tracing, convex combination, direct non-repudiation, full frqmeproof
CLC Number:
YU Zhi-qiang;YANG Bo.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://journal.xidian.edu.cn/xdxb/EN/
https://journal.xidian.edu.cn/xdxb/EN/Y2004/V31/I6/943
An improved traitor tracing scheme based on modified RSA
An improved dynamic traitor tracing scheme
A traitor tracing scheme based on RSA
Cited