Multi-service oriented traitor tracing scheme on LIFP

被引:0
|
作者
Key Lab. of Computer Network and Info. Security, Xidian Univ., Xi'an 710071, China [1 ]
不详 [2 ]
机构
来源
Dianzi Yu Xinxi Xuebao | 2007年 / 5卷 / 1177-1181期
关键词
Cryptography - Public key cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
A multi-service traitor tracing scheme on LIFP (Large Integer Factoring Problem) is proposed, the essential idea of which is that an equation based on LIFP is constructed and a parameter is introduced to transfer service private-key. In decryption procedure, the session key can be obtained by the equation and the service private-key. Compared with the existing two traitor tracing schemes, this scheme has many advantages such as multi-service, black-box traitor tracing, ciphertexts of constant size, adding or revoking users, forward-security and backward-security. Furthermore, its whole capabilities are better than that of the existing ones.
引用
收藏
页码:1177 / 1181
相关论文
共 50 条
  • [21] A traitor tracing scheme based on the RSA system
    Yang, Bo
    Ma, Hua
    Zhu, Shenglin
    International Journal of Network Security, 2007, 5 (02) : 182 - 186
  • [22] Efficient traitor tracing scheme based on NTRU
    Lv, XX
    Yang, B
    Pei, CX
    PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 120 - 124
  • [23] An efficient traitor tracing scheme for broadcast encryption
    Yoshida, M
    Fujiwara, T
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 463 - 463
  • [24] Analytical Modeling of Multi-service Systems with Multi-service Sources
    Glabowski, Mariusz
    Sobieraj, Maciej
    Stasiak, Maciej
    2010 16TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2010), 2010, : 285 - 290
  • [25] A novel multi-service scheduling scheme for E-UTRA
    Chen, Bin
    Hu, Honglin
    Wang, Bin
    Wang, Haifeng
    2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, : 49 - +
  • [26] Novel Multi-Service Datacasting Scheme over DTMB System
    Wang, Xiaoqing
    Tang, Shigang
    Li, Yangang
    Jia, Shuyun
    2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [27] Dynamic resource allocation scheme in multi-service CDMA systems
    Yang, JG
    Koo, I
    Choi, Y
    Kim, Y
    Ahn, J
    Kim, K
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (09) : 2634 - 2637
  • [28] An Improved Traitor Tracing Scheme Based on Bilinear Map
    ZHANG Xuejun School of Education Technology and Communication
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 5 - 8
  • [29] Improving the Boneh-Franklin Traitor Tracing Scheme
    Junod, Pascal
    Karlov, Alexandre
    Lenstra, Arjen K.
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 88 - +
  • [30] New traitor tracing scheme against anonymous attack
    Yang, Chen
    Ma, Wenping
    Wang, Xinmei
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 389 - +