Font Size: a A A

Research On Traitor Tracing Scheme And Digital Copyright Protection Technology

Posted on:2006-08-01Degree:MasterType:Thesis
Country:ChinaCandidate:X H HeFull Text:PDF
GTID:2168360152971634Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The problem of digital copyright protection is taken into account by more and more people. Cryptographical technology is one of the key solutions to this problem. In this dissertation, the author focuses on how to apply the modern cryptography to construct traitor tracing scheme and digital copyright protection scheme. In order to prevent the piracy occurring and protect the digital production producer's and the copyright owner's rights and interests. Following are the main results of this thesis: Briefly introduce the origin and the basal model of traitor tracing scheme. Expatiate the relations of cryptography, traitor tracing and digital copyright protection . Systematically introduce the private and public key traitor tracing scheme's developmental status and characters. Construct three public key traitor tracing schemes. Applying the modern cryptographical technology constructs two digital copyright protection schemes. Analyze the relation of the traitor tracing scheme and the digital copyright protection scheme. Construct a public key traitor tracing scheme .Using the scheme, the author gives a digital copyright protection scheme.
Keywords/Search Tags:cryptography, traitor tracing, digital copyright protection
PDF Full Text Request
Related items