Collusion-free public-key traitor tracing scheme

All the existing traitor tracing schemes can trace at least a traitor when the number of traitors is not beyond a certain predefined value. However , how to prevent traitors from colluding a valid key is a open problem. A new traitor tracing scheme was presented, in which traitors can not get a vali...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG Qing-long1, YANG Bo2, HAN Zhen1, GENG Xiu-hua1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2006-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74660016/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537392107847680
author WANG Qing-long1
YANG Bo2
HAN Zhen1
GENG Xiu-hua1
author_facet WANG Qing-long1
YANG Bo2
HAN Zhen1
GENG Xiu-hua1
author_sort WANG Qing-long1
collection DOAJ
description All the existing traitor tracing schemes can trace at least a traitor when the number of traitors is not beyond a certain predefined value. However , how to prevent traitors from colluding a valid key is a open problem. A new traitor tracing scheme was presented, in which traitors can not get a valid key by conspiracy, no matter how many traitors there were because each user’s decryption key was independent of any others. Further, our scheme can determine a traitor in speediness and accuracy, thus it can reach a better determent to those potential bad users. Meanwhile, compared with present schemes, this scheme has a higher transmission efficiency.
format Article
id doaj-art-6f1832d33f08493c9e3cd027e235b262
institution Kabale University
issn 1000-436X
language zho
publishDate 2006-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-6f1832d33f08493c9e3cd027e235b2622025-01-14T08:37:09ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2006-01-016974660016Collusion-free public-key traitor tracing schemeWANG Qing-long1YANG Bo2HAN Zhen1GENG Xiu-hua1All the existing traitor tracing schemes can trace at least a traitor when the number of traitors is not beyond a certain predefined value. However , how to prevent traitors from colluding a valid key is a open problem. A new traitor tracing scheme was presented, in which traitors can not get a valid key by conspiracy, no matter how many traitors there were because each user’s decryption key was independent of any others. Further, our scheme can determine a traitor in speediness and accuracy, thus it can reach a better determent to those potential bad users. Meanwhile, compared with present schemes, this scheme has a higher transmission efficiency.http://www.joconline.com.cn/zh/article/74660016/traitorindependentcollusionefficiency
spellingShingle WANG Qing-long1
YANG Bo2
HAN Zhen1
GENG Xiu-hua1
Collusion-free public-key traitor tracing scheme
Tongxin xuebao
traitor
independent
collusion
efficiency
title Collusion-free public-key traitor tracing scheme
title_full Collusion-free public-key traitor tracing scheme
title_fullStr Collusion-free public-key traitor tracing scheme
title_full_unstemmed Collusion-free public-key traitor tracing scheme
title_short Collusion-free public-key traitor tracing scheme
title_sort collusion free public key traitor tracing scheme
topic traitor
independent
collusion
efficiency
url http://www.joconline.com.cn/zh/article/74660016/
work_keys_str_mv AT wangqinglong1 collusionfreepublickeytraitortracingscheme
AT yangbo2 collusionfreepublickeytraitortracingscheme
AT hanzhen1 collusionfreepublickeytraitortracingscheme
AT gengxiuhua1 collusionfreepublickeytraitortracingscheme