Collusion-free public-key traitor tracing scheme
All the existing traitor tracing schemes can trace at least a traitor when the number of traitors is not beyond a certain predefined value. However , how to prevent traitors from colluding a valid key is a open problem. A new traitor tracing scheme was presented, in which traitors can not get a vali...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2006-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74660016/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537392107847680 |
---|---|
author | WANG Qing-long1 YANG Bo2 HAN Zhen1 GENG Xiu-hua1 |
author_facet | WANG Qing-long1 YANG Bo2 HAN Zhen1 GENG Xiu-hua1 |
author_sort | WANG Qing-long1 |
collection | DOAJ |
description | All the existing traitor tracing schemes can trace at least a traitor when the number of traitors is not beyond a certain predefined value. However , how to prevent traitors from colluding a valid key is a open problem. A new traitor tracing scheme was presented, in which traitors can not get a valid key by conspiracy, no matter how many traitors there were because each user’s decryption key was independent of any others. Further, our scheme can determine a traitor in speediness and accuracy, thus it can reach a better determent to those potential bad users. Meanwhile, compared with present schemes, this scheme has a higher transmission efficiency. |
format | Article |
id | doaj-art-6f1832d33f08493c9e3cd027e235b262 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2006-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-6f1832d33f08493c9e3cd027e235b2622025-01-14T08:37:09ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2006-01-016974660016Collusion-free public-key traitor tracing schemeWANG Qing-long1YANG Bo2HAN Zhen1GENG Xiu-hua1All the existing traitor tracing schemes can trace at least a traitor when the number of traitors is not beyond a certain predefined value. However , how to prevent traitors from colluding a valid key is a open problem. A new traitor tracing scheme was presented, in which traitors can not get a valid key by conspiracy, no matter how many traitors there were because each user’s decryption key was independent of any others. Further, our scheme can determine a traitor in speediness and accuracy, thus it can reach a better determent to those potential bad users. Meanwhile, compared with present schemes, this scheme has a higher transmission efficiency.http://www.joconline.com.cn/zh/article/74660016/traitorindependentcollusionefficiency |
spellingShingle | WANG Qing-long1 YANG Bo2 HAN Zhen1 GENG Xiu-hua1 Collusion-free public-key traitor tracing scheme Tongxin xuebao traitor independent collusion efficiency |
title | Collusion-free public-key traitor tracing scheme |
title_full | Collusion-free public-key traitor tracing scheme |
title_fullStr | Collusion-free public-key traitor tracing scheme |
title_full_unstemmed | Collusion-free public-key traitor tracing scheme |
title_short | Collusion-free public-key traitor tracing scheme |
title_sort | collusion free public key traitor tracing scheme |
topic | traitor independent collusion efficiency |
url | http://www.joconline.com.cn/zh/article/74660016/ |
work_keys_str_mv | AT wangqinglong1 collusionfreepublickeytraitortracingscheme AT yangbo2 collusionfreepublickeytraitortracingscheme AT hanzhen1 collusionfreepublickeytraitortracingscheme AT gengxiuhua1 collusionfreepublickeytraitortracingscheme |