节点文献
叛逆者追踪研究
Research on Traitor Tracing
【作者】 杨文峰;
【导师】 杨波;
【作者基本信息】 西安电子科技大学 , 密码学, 2006, 硕士
【摘要】 随着电子商务的迅速发展,数字产品版权保护的研究越来越受重视。鉴于数字产品的多样性,数字版权保护的方式也多种多样。叛逆者追踪技术是研究在广播/网络环境中发现盗版时如何追踪盗版源,从而起到保护数字产品经营者的合法利益,打击和威慑盗版的作用。在实际中通常是把叛逆者追踪方案和广播加密方案有效地结合起来使盗版造成的损失最小化。叛逆者追踪技术不仅为广播数字信息提供了一种新型的版权保护技术,也必将促进现有版权保护技术的完善与发展。本文对叛逆者追踪作了深入研究,取得了如下一些成果:详细叙述了数字版权保护技术的起源,进展,研究现状以及存在的问题。简要介绍了叛逆者追踪的相关理论与技术。阐述了叛逆者追踪的研究背景、现状、存在的问题及建议。主要从广播效率、产品供应商和用户的存储和运算代价三个方面对已有叛逆者追踪方案的性能进行了分析总结。设计了一种基于NTRU密码系统的叛逆者追踪方案,其安全性与NTRU密码系统等价,并具有抗任意数量的共谋攻击、黑盒子追踪、高效率、匿名、非对称、可撤销等性质。设计了一种基于双线性映射的非对称公钥叛逆者追踪方案,其安全性基于椭圆曲线上BDDH问题的困难性。新方案可追踪到所有的叛逆者,并在效率和撤销性方面比现有的叛逆者追踪方案有明显提高。
【Abstract】 With rapid development of E-business, more and more attention is paid to the copyright protection of digital contents. Different ways are used to protect digital copyright for different digital contents. Traitor tracing schemes are designed to trace piracy back to its original source once it has been detected in a broadcast/network environment, so that the content provider has some means of recourse against piracy. In practice, traitor tracing schemes and broadcast encryption schemes can be effectively combined in order to minimize the damage as the result of piracy. Traitor tracing technology not only provides a new digital copyright protection mechanism for broadcast information, but also promotes the development of the existing copyright protection technologies.What follows are the main achievements of this thesis:Introduce the state of digital copyright protection in detail.Introduce the related theories and technologies of traitor tracing.Provide a brief survey of the state of traitor tracing technology .A uniform analysis of the major work in this area is presented and comparisons are made between the competing schemes. Such comparisons are based on performance benchmarks such as the memory and computation requirements of the both content supplier and users as well as the broadcast overhead involved.Propose an NTRU cryptosystem based traitor tracing scheme, which is as secure as NTRU. This novel work contains some desirable features, such as full collusion-resistance, black-box tracing, high efficiency, anonymity, asymmetry and revocation.Propose a new asymmetric public-key traitor tracing scheme based on bilinear map. The underlying security assumption of the scheme is the difficulty of Bilinear Decision Diffie-Hellman(BDDH) problem on elliptic curves. The novel work is capable of identifying all the active traitors with black-box tracing algorithm and gains an advantage over previous schemes in efficiency and revocation.
- 【网络出版投稿人】 西安电子科技大学 【网络出版年期】2007年 02期
- 【分类号】TN911
- 【下载频次】129