traitor tracing
叛逆者追蹤
2025-01-06 21:08 浏览次数 1
叛逆者追蹤
tracing traitor叛逆跟蹤
Research on Traitor Tracing叛逆者追蹤研究
asymmetric traitor tracing非对称叛逆者追蹤
traitor tracing scheme追蹤体制
in this dissertation, the author focuses on how to apply the modern cryptography to construct traitor tracing scheme and digital copyright protection scheme.
在本文中,笔者着重研究如何利用现代密码技术来构造叛逆者追蹤方案和数字版权保护方案。
a public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.
公钥加密算法和追蹤算法结合在一起,可构成一个公钥广播加密方案。
analyze and summarize the performance of the presented traitor tracing schemes in detail.
对已有叛逆者追蹤方案的性能进行了分析总结。
on the basis of the above, a multi-service oriented traitor tracing scheme on lifp is proposed.
在此基础上,提出了面向多服务的基于大整数分解困难问题的叛逆者追蹤方案。
based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme.
利用不经意多项式估值协议,该文提出了一种新的非对称公钥叛逆者追蹤方案。
to solve the symmetry and the non-revocation of current digital copyright protection model, an improved model based on traitor tracing scheme is proposed.
为有效解决目前数字版权保护模型中存在的对称性和不具备可撤销性等问题,提出了一种改进的基于叛逆者追蹤方案的数字版权保护模型。
based on the solution structure of the non-homogeneous linear equation system, this paper presents a new public-key traitor tracing scheme.
利用非奇次线形方程组解的结构,提出了一种新的公钥叛逆者追蹤方案。
the scheme can be used to construct public key traitor tracing schemes. 2.
也可以用来构造公钥叛逆者追蹤方案。
design two traitor tracing schemes.
设计了两种叛逆者追蹤方案。
in addition, we also use the existing traitor tracing schemes to construct two models for electronic software selling and copyright protection.
本文还应用现有的两个叛逆者追蹤方案构造了两种功能不同的软件销售和版权保护的模型。
a new model for electronic software distribution and copyright protection based on an asymmetric public-key traitor tracing scheme is designed.
基于一种非对称公钥叛逆者追蹤方案给出了新的电子软件销售和产权保护模型,适用于一类需要安装运行的软件。
traitor tracing is a kind of broadcast with traceability, which falls into the category of fingerprinting.
叛逆者追蹤是一种可以追蹤的广播加密算法,也属于数字指纹的范畴。
an asymmetric traitor tracing is a very imporport problem which needs to be solved in secure distribution of a encrypted data.
非对称叛逆者追蹤是加密数据安全分发中要解决的一个非常重要的问题。
provide a brief survey of the state of traitor tracing technology .
简要介绍了叛逆者追蹤的相关理论与技术。
by applying rs code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.
利用rs码和两锁密码协议构造了一种非对称的公钥叛逆者追蹤方案。
a traitor tracing scheme based on m sequence is proposed.
文中提出一种基于m序列的叛逆追蹤方案。
this paper proposes a new pki-based public-key traitor tracing scheme.
给出了一个新的基于pki的公钥追蹤体制。
absrtact: traitor tracing schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to content.
摘 要:当一些共谋者试图构造一个盗版的解码器以获取对数据内容非法访问的时候,叛逆者追蹤模型可以用来发现至少其中的一个叛逆者。
and the main results are as follows:1. describing two kinds of traitor tracing schemes against collusion key attack in detail and analyzing their performance in depth.
详细介绍了对抗共谋密钥攻击的两类叛徒追蹤方案:对称叛徒追蹤方案和非对称叛徒追蹤方案,并且深入的分析了它们各自的性能。
a new efficient traitor tracing scheme using bilinear mapping is presented in order to solve the user-key leaking problem in digital right management.
为了解决数字版权保护中的用户密钥泄漏问题,提出了一种基于双线性映射的叛逆者追蹤方案。
this paper proposes a public key traitor tracing scheme based on rsa.
提出一种基于rsa的公钥叛逆追蹤方案。
at the same time, using the traitor tracing scheme, it constructs a kind of signing electronic license and software installation scheme which gives an efficient digital copyright protection scheme.
同时,利用此叛逆者追蹤方案,构造出一种签发电子证书和软件安装方案,从而给出了一种有效的数字版权保护方案。
traitor tracing schemes play an important role in tracing and identifying the traitors in conspiracy and replay attack.
叛徒追蹤方案是在共谋密钥攻击和重放攻击中追蹤及识别叛徒的有效措施。
this paper proposed a new discrete logarithm based public key traitor tracing scheme.
给出了一个新的基于离散对数的公钥追蹤体制。
this paper constructs a public key traitor tracing scheme by applying the linear codes and the oblivious polynomial evaluation protocol.
论文利用线性码和不经意多项式估值协议构造了一种公钥叛逆者追蹤方案。