Font Size: a A A

Research Of Traitor Tracing Based On Broadcast Encryption

Posted on:2011-09-10Degree:MasterType:Thesis
Country:ChinaCandidate:L YangFull Text:PDF
GTID:2178360308969502Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of networks and digital technology, it has brought many negative effects along with promoting social development. The protection of the copyrights of digital products has become a crucial issue that calls for immediate solution. The research of traitor tracing has important theoretical and application value for providing a comprehensive digital copyright protection in the field of broadcast encryption (such as pay-TV, online databases etc.).In this paper, many research work has been done around some important properties of traitor tracing based on broadcast encryption. Some main features of traitor tracing have been studied systematically, which include collusion resistance, asymmetry, adding or revoking subscriber, long-lived subscriber's key, black-box tracing, security and so on. The main results of this paper are as follows:●We summarize the existing traitor tracing schemes. Describe two kinds of traitor tracing schemes against key-collusion attack i.e. symmetry traitor tracing schemes and asymmetry traitor tracing schemes in detail. We introduce the constructions of some representative symmetry and asymmetry traitor tracing schemes, and analyze their performace.●By applying group-oriented technique to the key generation process, we present a group-based public-key traitor tracing scheme. By using group-oriented technique, we can construct more decryption keys, which is linear times the quantity of general scheme. Our tracing algorithm is faster as we can first narrow down the traitors to a specific group. Moreover, by combining the discrete log representation problem and large integer factoring problem, our scheme is fullly collusion resistant. It has the advantage of black-box tracing.●We present an improved asymmetric traitor tracing scheme. We maintain the high efficiency of the original program. Moreover, the adversary can't collude successfully in our scheme.
Keywords/Search Tags:Copyrights Protection, Traitor Tracing, Public-Key Cryptography, Collusion-resistance, Asymmetry
PDF Full Text Request
Related items