...
【24h】

Efficient trace and revoke schemes

机译:高效的跟踪和撤消方案

获取原文
获取原文并翻译 | 示例

摘要

Our goal is to design encryption schemes for mass distribution of data, which enable to (1) deter users from leaking their personal keys, (2) trace the identities of users whose keys were used to construct illegal decryption devices, and (3) revoke these keys as to render the devices dysfunctional. We start by designing an efficient revocation scheme, based on secret sharing. It can remove up to t parties, is secure against coalitions of up to t users, and is more efficient than previous schemes with the same properties. We then show how to enhance the revocation scheme with traitor tracing and self-enforcement properties. More precisely, how to construct schemes such that (1) each user's personal key contains some sensitive information of that user (e. g., the user's credit card number), in order to make users reluctant to disclose their keys. (2) An illegal decryption device discloses the identity of users that contributed keys to construct the device. And, (3) it is possible to revoke the keys of corrupt users. For the last point, it is important to be able to do so without publicly disclosing the sensitive information.
机译:我们的目标是设计用于大规模分发数据的加密方案,该方案能够(1)阻止用户泄露其个人密钥,(2)跟踪其密钥用于构造非法解密设备的用户的身份,以及(3)撤销这些键会导致设备无法正常工作。我们从设计基于秘密共享的有效撤销方案开始。它最多可以删除t个参与者,可以安全地防止最多t个用户的联盟,并且比以前具有相同属性的方案更有效。然后,我们展示了如何利用叛徒追踪和自我实施属性来增强撤销方案。更精确地讲,如何构造使(1)每个用户的个人密钥包含该用户的一些敏感信息(例如,用户的信用卡号)的方案,以使用户不愿透露其密钥。 (2)非法解密设备公开了贡献密钥以构造该设备的用户的身份。并且,(3)可以撤销已损坏用户的密钥。最后一点,重要的是能够做到这一点,而无需公开披露敏感信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号