透過您的圖書館登入
IP:18.117.159.229
  • 學位論文

最佳密文傳輸率的公開金鑰背叛者追蹤系統

A Public-Key Traitor Tracing Scheme with Optimal Transmission Rate

指導教授 : 曾文貴

摘要


如何在廣播環境中傳送加密的數位內容給合法的訂閱者是一個在許多的商業模式中 (像是付費電視、DVD等) 很廣泛的議題。而在這樣的環境中,為了要能夠有效嚇阻合法的數位內容訂閱者將其所擁有合法解密金鑰洩露出去,背叛者追蹤系統便因應而生了。在這篇論文中,我們提出了一個背叛者追蹤系統,其所使用的廣播金鑰可以是公開的。而且在我們的系統中,密文的傳輸率可以達到最佳 (也可以說是常數密文傳輸量),也就是說,幾乎不需要多餘的頻寬即可加密傳送數位內容。而在追蹤背叛者的能力方面,我們提出的的系統可以支援黑盒追蹤,也就是說,我們可以在不能直接察看非法解密器內部的情形下,仍然可以成功追蹤出該非法解密器是使用哪些背叛者的金鑰。而跟之前的所提出的一些相關系統相比,我們的系統在廣播金鑰以及使用者解密金鑰上,皆可以達到較低的儲存空間需求。

關鍵字

背叛者追蹤

並列摘要


The way of transmitting the encrypted digital contents to the legitimate subscribers in a broadcast environment is a wide application for many commercial transactions (e.g. pay-TV, DVD, etc.). In order to discourage the legitimate subscribers from giving away their decryption keys, the traitor tracing system is very useful. In this paper, we propose a traitor tracing scheme in which the encryption key for broadcasting can be published and our scheme has optimal transmission rate. In another word, while transmitting the digital contents, our scheme can encrypt nearly without any redundancy. As for tracing, our scheme can support black-box tracing, i.e., knowing the legitimate subscribers who leak their decryption keys out without opening the pirate decoder to check the decryption inside. Moreover, comparing to the previous schemes, the storage requirements for legitimate subscribers and digital content broadcasters can be smaller.

參考文獻


[1] Bellare, M., and Rogaway, P. Optimal asymmetric encryption. In EUROCRYPT (1994), pp. 92-111.
[2] Billet, O., and Phan, D. H. Traitors collaborating in public: Pirates 2.0. In EUROCRYPT (2009), A. Joux, Ed., vol. 5479 of Lecture Notes in Computer Science, Springer, pp. 189-205.
[3] Boneh, D., and Franklin, M. An e_cient public key traitor tracing scheme. In CRYPTO (1999), Springer-Verlag, pp. 338-353.
[5] Boneh, D., Sahai, A., and Waters, B. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT (2006), S. Vaudenay, Ed., vol. 4004 of Lecture Notes in Computer Science, Springer, pp. 573-592.
[6] Boneh, D., and Shaw, J. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44, 5 (1998), 1897-1905.

延伸閱讀