By applying the linear space codes and the oblivious polynomial evaluation protocol, the paper constructs a scheme of generating electronic license and electronic license decryption key. Basing on the scheme, it gives...
详细信息
By applying the linear space codes and the oblivious polynomial evaluation protocol, the paper constructs a scheme of generating electronic license and electronic license decryption key. Basing on the scheme, it gives a secure on-line electronic software installation scheme. Thus forms a digital copyright protection scheme. When the piracy occurring, the data supplier can trace the pirate and revoke the decryption ability of the pirate's electronic license decryption key by updating the code vectors of the users. Reaching the aim of maintaining the digital copyright and protecting its legal right. It also makes the scheme has the character of dynamic revocation. The scheme has some other characters such as self-enforcement, direct non-repudiation, frameproof, and so on.
A new traitor tracing scheme is proposed, whose essential idea is the session key S is divided into a sum of S1 and S2. Based on DL (discrete logarithm) problem, S1 is decrypted by introducing a multi-channel service ...
详细信息
A new traitor tracing scheme is proposed, whose essential idea is the session key S is divided into a sum of S1 and S2. Based on DL (discrete logarithm) problem, S1 is decrypted by introducing a multi-channel service parameter and a special polynomial function, S2 is decrypted by Chinese Remainder Theorem. The new scheme has many advantages such as multi-service, collusion-resistance, asymmetry, long-lived subscriber's key and black-box tracing. It is proved to be semantically secure under the DDH (Diffie-Hellman Problem) assumption and its whole capabilities are much better than that of the existing ones.
To protect the profit of DS (Data Supplier) and authorized users better and provide multiple services for users, a new multi-service oriented collusion-resistant asymmetric traitor tracing scheme was proposed, in whic...
详细信息
To protect the profit of DS (Data Supplier) and authorized users better and provide multiple services for users, a new multi-service oriented collusion-resistant asymmetric traitor tracing scheme was proposed, in which the session key S was divided into a sum of S1 and S2. Under the condition of large integer factoring problem, S1 was decrypted by constructing a special equation (scheme 1). Under the condition of discrete logarithm problem, S2 was decrypted by OPE (Oblivious Polynomial Evaluation) protocol and Lagrange Interpolation Polynomial (scheme 2). On the basis of the combination of the scheme 1 and scheme 2, a new traitor tracing scheme was formed. The new scheme has many advantages such as multi-service, collusion-resistance, asymmetry, black-box tracing, forward-security and backward-security, and its whole capabilities is also better than existing ones.
Survivability has become increasingly important with society's increased dependence of critical infrastructures on computers. Survivability is the capability of a system to fulfill its mission, in a timely manner,...
详细信息
Survivability has become increasingly important with society's increased dependence of critical infrastructures on computers. Survivability is the capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents. One way of achieving Survivability is to equip systems with both intrusion tolerance and security mechanisms. In this paper, we describe Survivability concepts and discuss common techniques in fault-tolerance and security for Survivability. Then we propose a Survivability model based on fault-tolerance and security. We also discuss associated activities to support Survivability goals for systems based on commercial off-the shelf (COTS) servers. Finally, we present a systematic method for performing Survivability analysis of services in network system.
暂无评论