Font Size: a A A

Research Of Traitor Tracing Scheme

Posted on:2005-09-06Degree:MasterType:Thesis
Country:ChinaCandidate:Q F ChengFull Text:PDF
GTID:2178360155472039Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Traitor Tracing Scheme is an important component of the digital fingerprint technology. It can be used for digital contents copyright protection and tracing traitors.In this thesis, we summarize the existing traitor tracing schemes and introduce the constructions of some representative symmetric and asymmetric traitor tracing schemes. Especially, we analyze and attack Kim traitor tracing scheme. We provide two kinds of attack methods to Kim scheme's key generation and enabling block encryption.In addition, we also use the existing traitor tracing schemes to construct two models for electronic software selling and copyright protection. The first model, which bases on an asymmetric traitor tracing scheme, can offer non-repudiation and full frameproof. It eventually guarantees the right of both merchant and user. The second model bases on scalable public-key traitor tracing scheme. It provides an intact protection scheme to the software which needs to be installed and updated on line.
Keywords/Search Tags:Traitor Tracing, Copyright Protection, Public-Key Cryptosystem, Discrete Logarithm, Model
PDF Full Text Request
Related items