【24h】

Efficient Trace and Revoke Schemes

机译:高效的跟踪和撤销方案

获取原文

摘要

Our goal is to design encryption schemes for mass distribution of data in which it is possible to (1) deter users from leaking their personal keys, (2) trace which users leaked keys to construct an illegal decryption device, and (3) revoke these keys as to render the device dysfunctional. We start by designing an efficient revocation scheme, based on secret sharing. It can remove up to t parties and is secure against coalitions of size t. The performance of this scheme is more efficient than that of previous schemes with the same properties. We then show how to combine the revocation scheme with traitor tracing and self enforcement schemes. More precisely, how to construct schemes such that (1) Each user's personal key contains some sensitive information of that user (e.g., the user's credit card number), and therefore users would be reluctant to disclose their keys. (2) An illegal decryption device discloses the identity of users that contributed keys to construct the device. And, (3) it is possible to revoke the keys of corrupt users. For the last point it is important to be able to do so without publicly disclosing the sensitive information.
机译:我们的目标是设计群众分布的加密方案,其中可以(1)阻止用户泄露其个人键,(2)用户泄露键构造非法解密设备的跟踪,(3)撤消这些键渲染设备功能失调。我们首先设计基于秘密共享的高效撤销方案。它可以删除T派对,并防止尺寸T的联盟。该方案的性能比以前具有相同性质的方案的性能更有效。然后,我们展示如何将拆迁方案与叛逆者跟踪和自我实施方案结合起来。更精确地,如何构建方案,使得(1)每个用户的个人密钥包含该用户的一些敏感信息(例如,用户的信用卡号码),因此用户将不愿意披露其键。 (2)非法解密设备披露了贡献键构造设备的用户的身份。 (3)可以撤消腐败用户的密钥。最后一点,在不公开披露敏感信息的情况下,能够这样做是很重要的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号