Font Size: a A A

Traitor Tracing Scheme Based On Ellipic Curve Cryptosystem

Posted on:2009-11-10Degree:MasterType:Thesis
Country:ChinaCandidate:W WangFull Text:PDF
GTID:2178360245986885Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of the networks and digital technology, the copyright protection for digital products has become an urgent problem. In the broadcasting encryption system, the source of piracy will be tracked in the use of the traitor tracing scheme, thereby the piracy will be prevented and the legitimate rights and interests of the copyright holder is protected.A public-key traitor tracing scheme based on ECC is presented in this paper, which makes use of the oblivious polynomial evaluation protocol, Lagrange Interpolation Polynomial and Weil paring with the bilinear property. This scheme can accurately determine a or all traitor(s). Furthermore, it has many advantages such as asymmetry (user's non-repudiation and data provider's no-framing innocent users), collusion-resistance, revoking traitors and adding users.In addition to the above scheme and proof of the related theory, this paper also gives an Implementation of the key technologies of the tracking scheme such as selection the secure elliptic curves and computing the Weil paring.
Keywords/Search Tags:ECC, bilinear pairing, Weil paring, traitor tracing
PDF Full Text Request
Related items