作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2011, Vol. 37 ›› Issue (4): 161-162. doi: 10.3969/j.issn.1000-3428.2011.04.057

• 安全技术 • 上一篇    下一篇

基于群的公钥叛逆者追踪方案

杨 岚1,李乔良2,周波清1,刘昀岢2   

  1. (1. 湖南大学计算机与通信学院,长沙 410082;2. 湖南师范大学数学与计算机科学学院,长沙 410081)
  • 出版日期:2011-02-20 发布日期:2011-02-17
  • 作者简介:杨 岚(1985-),女,硕士研究生,主研方向:信息安全;李乔良,教授、博士;周波清,博士研究生;刘昀岢,硕士研究生

Group-based Public Key Traitor Tracing Scheme

YANG Lan 1, LI Qiao-liang 2, ZHOU Bo-qing 1, LIU Yun-ke 2   

  1. (1. School of Computer and Communication, Hunan University, Changsha 410082, China; 2. College of Mathematics and Computer Science, Hunan Normal University, Changsha 410081, China)
  • Online:2011-02-20 Published:2011-02-17

摘要:

为有效保护数据提供者的合法权益,提出一种基于群的公钥叛逆者追踪方案。依据群合谋的行为特征将合法用户分成不同的群,利用分群思想生成更多合法密钥。在叛逆者检测时将可疑用户缩小到特定群,从而提高检测效率。通过求解大整数分解困难问题和离散对数困难问题证明,该方案完全抗合谋,且具有黑盒追踪性。

关键词: 抗共谋, 加密和解密, 黑盒追踪

Abstract:

To protect the legal interests of copyright owners efficiently, this paper presents a group-based public key pirate tracing scheme. Legal users are divided into groups. By applying group-oriented technique, they can construct more decryption keys. The tracing algorithm is faster as it can first narrow down the traitor to specific group. By combining the discrete log representation problem and large integer factoring problem, this scheme is full collusion resistant, and it has the advantage of black-box tracing.

Key words: collusion-resistance, encryption and decryption, black-box tracing

中图分类号: