首页> 外文会议>ACM workshop on Digital rights management >On the security of a public-key traitor tracing scheme with sublinear ciphertext size
【24h】

On the security of a public-key traitor tracing scheme with sublinear ciphertext size

机译:uplinear密文大小的公钥追踪方案的安全性

获取原文

摘要

Traitor tracing refers to a class of encryption schemes that can be used to deter key-leakage. They apply to a setting that involves many receivers, each one receiving a fingerprinted decryption key. If a set of malicious receivers (also known as traitors) constructs an illicit decoder then a tracing mechanism enables an authority to identify at least one of the traitors. The very first traitor tracing scheme that has sublinear ciphertext size and is capable of tracing unambiguously illicit decoders that may shut-down (or employ some sort of self-defensive mechanism that would be adverse to tracing) was proposed in AsiaCrypt 2004 by Matsushita and Imai.
机译:追踪跟踪是指可用于阻止键泄漏的一类加密方案。它们适用于涉及许多接收器的设置,每个接收器接收指纹识别解密密钥。如果一组恶意接收器(也称为痕迹)构造非法解码器,则追踪机制使得能够识别至少一个追踪者。由Matsushita和Imai的亚洲建议,在亚洲,在Matsushita和Imai提出了第一个追踪可能关闭的明确非法解码器(或采用对跟踪不利的自我防守机制)的第一个追踪追踪方案。 。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号