• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Qinglong, Han Zhen, Yang Bo. A Traitor Tracing Scheme Based on Bilinear Map[J]. Journal of Computer Research and Development, 2009, 46(3): 384-389.
Citation: Wang Qinglong, Han Zhen, Yang Bo. A Traitor Tracing Scheme Based on Bilinear Map[J]. Journal of Computer Research and Development, 2009, 46(3): 384-389.

A Traitor Tracing Scheme Based on Bilinear Map

More Information
  • Published Date: March 14, 2009
  • Traitor tracing schemes are used to fight piracy when distributing securely some data to multiple authorized receivers. By traitor tracing schemes, at least one authorized user will be found from those who collude and share their decryption keys to unauthorized users. Based on bilinear map a new public-key traitor tracing scheme is presented in this paper. The main contribution of this scheme is that it concurrently satisfies the following features: 1) Both the number of keys stored by a user and the length of broadcasted block data are independent of the number of users. 2) Full collusion resistance: no users can construct a different valid decryption key from themselves by coalition. 3) Full revoke: any selected users can be revoked without renewing the others’ decryption keys. 4) Full recoverability: any revoked users can be recovered without renewing their decryption keys. Most importantly, compared with the existing schemes that satisfy the above properties, the translation overhead and storage overhead in the new scheme are independent of the total number of users. Finally, in the scheme presented any sets of users can be treated as authorized users. The security of this scheme is based on the difficult problems of solving discrete logarithm problem and decision Diffie-Hellman problem (DDH).
  • Related Articles

    [1]Pu Yonglin, Yu Jiong, Lu Liang, Li Ziyang, Guo Binglei, Liao Bin. Energy-Efficient Strategy Based on Data Recovery in Storm[J]. Journal of Computer Research and Development, 2021, 58(3): 479-496. DOI: 10.7544/issn1000-1239.2021.20200489
    [2]Li Zengpeng, Ma Chunguang, Zhao Minghao. Leveled Fully Homomorphic Encryption Against Adaptive Key Recovery Attacks[J]. Journal of Computer Research and Development, 2019, 56(3): 496-507. DOI: 10.7544/issn1000-1239.2019.20170443
    [3]Shi Hui, Li Mingchu. Safe Variable-Capacity Self-Recovery Watermarking Scheme[J]. Journal of Computer Research and Development, 2014, 51(8): 1715-1726. DOI: 10.7544/issn1000-1239.2014.20130232
    [4]Yuan Chunyang, Xu Junfeng, Zhu Chunge. A Trusted Recovery Model for Assurance of Integrity Policy Validity[J]. Journal of Computer Research and Development, 2014, 51(2): 360-372.
    [5]Wang Xiaoming, Yao Guoxiang, and Liao Zhiwei. Cryptanalysis and Modification of a Traitor Tracing Scheme[J]. Journal of Computer Research and Development, 2013, 50(10): 2092-2099.
    [6]Mei Xiaoyong, Li Shixian, Huang Changqin, Zheng Xiaolin. Failure-Recovery-Strategies-Based QoS Estimation for Web Composition Transaction[J]. Journal of Computer Research and Development, 2012, 49(11): 2464-2480.
    [7]Hu Qiaolin, Sun Yipin, and Su Jinshu. BAR-BGP: Achieving High Reliability Interdomain Routing Through Backup AS-Address Advertisement and Recovery Forwarding[J]. Journal of Computer Research and Development, 2011, 48(12): 2242-2252.
    [8]Yu Jia, Kong Fanyu, Hao Rong, Li Daxing. A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2010, 47(4): 605-612.
    [9]Wei Lingbo, Wu Chuankun, Zhou Sujing. A New Verifier-Local Revocation Group Signature with Backward Unlinkability[J]. Journal of Computer Research and Development, 2008, 45(8): 1315-1321.
    [10]Xiao Liang, Wei Zhihui, Wu Huizhong. A Generalized Variational Image Restoration Model Based on MAP and Robust Estimation[J]. Journal of Computer Research and Development, 2007, 44(7): 1105-1113.

Catalog

    Article views (711) PDF downloads (505) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return