Welcome to Journal of Beijing Institute of Technology
Volume 24Issue 1
.
Turn off MathJax
Article Contents
SU Jia-jun, WANG Xin-mei. New scheme of dynamic traitor tracing against the immediate rebroadcast attack[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2015, 24(1): 128-132. doi: 10.15918/j.jbit1004-0579.201524.0118
Citation: SU Jia-jun, WANG Xin-mei. New scheme of dynamic traitor tracing against the immediate rebroadcast attack[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2015, 24(1): 128-132.doi:10.15918/j.jbit1004-0579.201524.0118

New scheme of dynamic traitor tracing against the immediate rebroadcast attack

doi:10.15918/j.jbit1004-0579.201524.0118
  • Received Date:2014-06-17
  • Traitor tracing schemes are introduced to combat the piracy scenarios. The notation of dynamic traitor tracing is proposed by Fiat and Tassa, which fights against rebroadcast of decrypted content. In this paper, using the idea of searching user address level by level, a new dynamic traitor tracing scheme based on a multilevel structure of user set is constructed. The scheme proposed can efficiently combat with the immediate rebroadcast attack, and possesses lower tracing complexity. Importantly, the tracing scheme can be applicable to systems with different sizes of subscriber sets.
  • loading
  • [1]
    Fiat A, Naor M. Broadcast encryption[C]//International Crytology Conference-CRYPTO, Santa Barbara, CA, USA, 1993.
    [2]
    Chor B, Fiat A, Naor M. Tracing traitors[C]//International Crytology Conference-CRYPTO, Santa Barbara, CA, USA, 1994:257-270.
    [3]
    Kurosawa K, Desmedt Y. Optimum traitor tracing and asymmetric scheme[C]//Theory and Application of Cryptographic Techniques-EUROCRYPT, Espoo, Finland, 1998.
    [4]
    Naor M, Pinkas B. Threshold traitor tracing[C]//International Crytology Conference-CRYPTO, Santa Barbara, CA, USA, 1998.
    [5]
    Boneh D, Franklin M. An efficient public key traitor tracing scheme[C]//International Crytology Conference-CRYPTO, Santa Barbara, CA, USA, 1999.
    [6]
    Ma Hua, Cao Zhengwen. Traitor tracing scheme based on the encryption algorithm of RSA[J]. Journal of Xidian University, 2004, 31(4):611-613.(in Chinese)
    [7]
    Boneh D, Shaw J. Collusion-secure Fingerprinting for Digital Data [J]. IEEE Transactions on Information Theory-TIT, 1998, 44(5):1897-1905.
    [8]
    Cox I J, Kilian J, Leighton T, et al. A secure, robust watermark for multimedia[C]//Information Hiding, Cambridge, U.K., 1996.
    [9]
    Fiat A, Tassa T. Dynamic traitor tracing[C]//International Crytology Conference-CRYPTO, Santa Barbara, CA, USA, 1999.
    [10]
    Safavi-Naini R, Wang Yejing. Sequential traitor tracing [J]. IEEE Transactions on Information Theory, 2003, 49(5):1319-1326.
  • 加载中

Catalog

    通讯作者:陈斌, bchen63@163.com
    • 1.

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (718) PDF downloads(151) Cited by()
    Proportional views
    Related

    /

      Return
      Return
        Baidu
        map