A multi-service traitor tracing scheme on LIFP (Large Integer Factoring Problem) is proposed, the essential idea of which is that an equation based on LIFP is constructed and a parameter is introduced to transfer serv...
详细信息
A multi-service traitor tracing scheme on LIFP (Large Integer Factoring Problem) is proposed, the essential idea of which is that an equation based on LIFP is constructed and a parameter is introduced to transfer service private-key. In decryption procedure, the session key can be obtained by the equation and the service private-key. Compared with the existing two traitor tracing schemes, this scheme has many advantages such as multi-service, black-box traitor tracing, ciphertexts of constant size, adding or revoking users, forward-security and backward-security. Furthermore, its whole capabilities are better than that of the existing ones.
The session key S is divided into the sum of S1 and S2. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special equation(scheme 1). Under the condition of a discrete logarit...
详细信息
The session key S is divided into the sum of S1 and S2. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special equation(scheme 1). Under the condition of a discrete logarithm problem, S2 is decrypted by the OPE (oblivious polynomial evaluation) protocol and Lagrange interpolation polynomial (scheme 2). On the basis of a linearly additive combination of scheme 1 and scheme 2, a traitor tracing scheme is formed, which has advantages of both of them, and meanwhile overcomes their disadvantages. It has many advantages such as multi-service, collusion-resistance, asymmetry, black-box tracing, forward-security and backward-security, and its compositive performance is also better than those of existing ones.
By applying the linear space codes and the oblivious polynomial evaluation protocol, the paper constructs a scheme of generating electronic license and electronic license decryption key. Basing on the scheme, it gives...
详细信息
By applying the linear space codes and the oblivious polynomial evaluation protocol, the paper constructs a scheme of generating electronic license and electronic license decryption key. Basing on the scheme, it gives a secure on-line electronic software installation scheme. Thus forms a digital copyright protection scheme. When the piracy occurring, the data supplier can trace the pirate and revoke the decryption ability of the pirate's electronic license decryption key by updating the code vectors of the users. Reaching the aim of maintaining the digital copyright and protecting its legal right. It also makes the scheme has the character of dynamic revocation. The scheme has some other characters such as self-enforcement, direct non-repudiation, frameproof, and so on.
A new traitor tracing scheme is proposed, whose essential idea is the session key S is divided into a sum of S1 and S2. Based on DL (discrete logarithm) problem, S1 is decrypted by introducing a multi-channel service ...
详细信息
A new traitor tracing scheme is proposed, whose essential idea is the session key S is divided into a sum of S1 and S2. Based on DL (discrete logarithm) problem, S1 is decrypted by introducing a multi-channel service parameter and a special polynomial function, S2 is decrypted by Chinese Remainder Theorem. The new scheme has many advantages such as multi-service, collusion-resistance, asymmetry, long-lived subscriber's key and black-box tracing. It is proved to be semantically secure under the DDH (Diffie-Hellman Problem) assumption and its whole capabilities are much better than that of the existing ones.
To protect the profit of DS (Data Supplier) and authorized users better and provide multiple services for users, a new multi-service oriented collusion-resistant asymmetric traitor tracing scheme was proposed, in whic...
详细信息
To protect the profit of DS (Data Supplier) and authorized users better and provide multiple services for users, a new multi-service oriented collusion-resistant asymmetric traitor tracing scheme was proposed, in which the session key S was divided into a sum of S1 and S2. Under the condition of large integer factoring problem, S1 was decrypted by constructing a special equation (scheme 1). Under the condition of discrete logarithm problem, S2 was decrypted by OPE (Oblivious Polynomial Evaluation) protocol and Lagrange Interpolation Polynomial (scheme 2). On the basis of the combination of the scheme 1 and scheme 2, a new traitor tracing scheme was formed. The new scheme has many advantages such as multi-service, collusion-resistance, asymmetry, black-box tracing, forward-security and backward-security, and its whole capabilities is also better than existing ones.
The disk sanitization practices are studied. computer systems used by people with varying authorization levels typically employ authentication, access control lists, and a privileged operating system to maintain info....
详细信息
The disk sanitization practices are studied. computer systems used by people with varying authorization levels typically employ authentication, access control lists, and a privileged operating system to maintain info.mation privacy. The study indicates that the secondary hard-disk market is almost certainly awash in info.mation that is both sensitive and confidential. If sanitization practices are not significantly improved, it is only a matter of time before the confidential info.mation on repurposed hard drives is exploited by individuals and organizations that would do us harm.
Survivability has become increasingly important with society's increased dependence of critical infrastructures on computers. Survivability is the capability of a system to fulfill its mission, in a timely manner,...
详细信息
Survivability has become increasingly important with society's increased dependence of critical infrastructures on computers. Survivability is the capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents. One way of achieving Survivability is to equip systems with both intrusion tolerance and security mechanisms. In this paper, we describe Survivability concepts and discuss common techniques in fault-tolerance and security for Survivability. Then we propose a Survivability model based on fault-tolerance and security. We also discuss associated activities to support Survivability goals for systems based on commercial off-the shelf (COTS) servers. Finally, we present a systematic method for performing Survivability analysis of services in network system.
暂无评论