期刊文献+

一种完整的非对称公钥叛逆者追踪方案的密码学分析与改进

Cryptanalysis and improvement of complete asymmetric public-key traitor tracing scheme
在线阅读 下载PDF
导出
摘要 王青龙等人提出了一种完整的非对称公钥叛逆者追踪方案,并称该方案具有完善的撤销性和更高的传输效率等优点。对此进行详细分析发现它存在明显缺陷,提出一种攻击方案,使得叛逆者可以进行共谋攻击,但是管理者却无法使用黑盒叛逆者追踪方法对它们进行追踪。最后提出一种改进方案,在改进方案中,叛逆者虽然仍能实施上面提到的攻击,但是会被追踪者追踪到。 A complete asymmetric public-key traitor tracing scheme was proposed by Wang Qing-long et al, which claimed that it had some advantages such as revoking unlimited traitors and higher transmission efficiency. The scheme and its obvious defect were carefully analyzed, and then a attack was given. And traitors can perform a collusion attack, but the manager can not trace the traitors by the black-box traitor tracing method. Finally, an improved scheme was proposed in which traitors still could play the above attack, but they can be traced.
作者 张学军
出处 《计算机应用》 CSCD 北大核心 2008年第11期2808-2810,2826,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60573043) 中国博士后科学基金资助项目(20060400035) 西北师大青年教师科研基金资助项目(NWNU-QN-07-03)
关键词 叛逆者追踪 密码学分析 抗共谋 共谋攻击 traitor tracing cryptanalysis collusion-resistant collusion attack
作者简介 xjzhang99@163.com张学军(1968-),男,甘肃兰州人,副教授,博士,主要研究方向:密码学及应用。
  • 相关文献

参考文献11

  • 1CHOR B, FIAT A, NAOR M. Tracing traitors[ C]// Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology, LNCS 0839. London: Springer-Verlag, 1994: 257- 270.
  • 2KUROSAWA K, DESMEDT Y. Optimum traitor tracing and asymmetric schemes [ C]// Proceedings of Advances in Cryptology Eurocrypt'98, LNCS 1403. Berlin: Springer-Verlag, 1998: 145- 157.
  • 3BONEH D. FRANKLIN M K. An efficient public key traitor tracing scheme[ C]// Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, LNCS 1666. London: Springer-Verlag, 1999:338 -353.
  • 4KIAYIAS A, YUNG M. Breaking and repairing asymmetric publickey traitor tracing[ C]// proceedings of ACM Workshop on Digital Rights Management, LNCS 2696. London: Springer-Verlag, 2003: 32 -50.
  • 5王青龙,杨波.一种完整的非对称公钥叛逆者追踪方案[J].电子与信息学报,2006,28(3):407-409. 被引量:2
  • 6王青龙,杨波,韩臻,耿秀华.免共谋公钥叛逆者追踪方案[J].通信学报,2006,27(12):6-9. 被引量:10
  • 7NAOR M, PINKAS B. Oblivious transfer and polynomial evaluation [ C]// Proceedings of the 31st Annual ACM Symposium on Theory. of Computing. New York: ACM Press, 1999:245-254.
  • 8MATSUSHITA T. A flexibly revocable key-distribution scheme for efficient black-box tracing[ C]//Proceedings of the 4th International Conference on Information and Communications Security, LNCS 2513. London: Springer-Verlag, 2002:197 -205.
  • 9LV Xixiang,YANG Bo.Traitor Tracing Using Identity Based Public-key Cryptography[J].Chinese Journal of Electronics,2006,15(4):687-691. 被引量:4
  • 10张学军,余国林,周利华.面向多服务的基于大整数分解困难问题的叛逆者追踪方案[J].电子与信息学报,2007,29(5):1177-1181. 被引量:5

二级参考文献38

  • 1马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 2Chor B,Fiat A,Naor M.Tracing traitors[C]//Advances in Cryptology-CRYPT'94.Berlin:Springer-Verlag,1994:257-270.
  • 3Tzeng Wenguey,Tzeng Zhijia.A Public-key traitor tracing scheme with revocation using dynamic shares[C]//PKC 2001 Berlin:Springer-Verlag,2001:207-224.
  • 4Pfitzmann B.Trials of traced traitors[C]//Information Hiding'96.Berlin:Springer-Verlag,1996:49-64.
  • 5Kurosawa K,Desmedt Y.Optimum traitor tracing and asymmetric schemes[C]// Proc of Eurocrypt98.Berlin:Springer-Verlag,1998:145-157.
  • 6Watanabe Y,Hanaoka G,Imai H.Efficient asymmetric public key traitor tracing without trusted agents[C]//CT-RSA2001.Berlin:Springer-Verlag,2001:392-407.
  • 7Kiayias A,Yung M.Breaking and repairing asymmetric public-key traitor tracing[C]//ACM Workshop on DRM2002.Berlin:Springer-Verlag,2003:32-50.
  • 8Kim C H,Hwang Y H,Lee P J.Practical pay-TV scheme using traitor tracing scheme for multiple channels[C]//WISA 2004.LNCS 3325,Berlin:Springer-Verlag,2004:264277.
  • 9Naor M,Pinkas B.Oblivious transfer and polynomial evaluation[C]//Proc of STOC'99.Atlanta:ACM,1999:245-254.
  • 10Wagstaff S S.Cryptanalysis of number theoretic cipher[M].Boca Raton,Florida:CRC Press,2002:144-53.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部