首页> 外文会议>ACM workshop on Digital rights management >On the security of a public-key traitor tracing scheme with sublinear ciphertext size
【24h】

On the security of a public-key traitor tracing scheme with sublinear ciphertext size

机译:亚线性密文大小的公钥叛徒追踪方案的安全性

获取原文

摘要

Traitor tracing refers to a class of encryption schemes that can be used to deter key-leakage. They apply to a setting that involves many receivers, each one receiving a fingerprinted decryption key. If a set of malicious receivers (also known as traitors) constructs an illicit decoder then a tracing mechanism enables an authority to identify at least one of the traitors. The very first traitor tracing scheme that has sublinear ciphertext size and is capable of tracing unambiguously illicit decoders that may shut-down (or employ some sort of self-defensive mechanism that would be adverse to tracing) was proposed in AsiaCrypt 2004 by Matsushita and Imai.
机译:叛逃者跟踪是指可用于阻止密钥泄漏的一类加密方案。它们适用于涉及许多接收器的设置,每个接收器都接收一个指纹解密密钥。如果一组恶意接收者(也称为叛徒)构造了非法解码器,那么跟踪机制将使授权机构能够识别至少一个叛徒。 Matsushita和Imai在AsiaCrypt 2004中提出了第一个叛逆者跟踪方案,该方案具有亚线性密文大小,并且能够跟踪可能会关闭(或采用某种不利于跟踪的自防御机制)的明确的非法解码器。 。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号