A traitor tracing scheme based on m sequence is proposed.
文中提出一种基于M序列的叛逆追踪方案。
This paper proposes a public key traitor tracing scheme based on RSA.
提出一种基于RSA的公钥叛逆追踪方案。
This paper proposes a new PKI-based public-key traitor tracing scheme.
给出了一个新的基于PKI的公钥追踪体制。
ECC - based traitor tracing scheme is constructed with an error correcting code.
基于纠错码的叛逆者追踪模型是通过纠错码来构造的。
This paper proposed a new discrete logarithm based public key traitor tracing scheme.
给出了一个新的基于离散对数的公钥追踪体制。
Analyze and summarize the performance of the presented traitor tracing schemes in detail.
对已有叛逆者追踪方案的性能进行了分析总结。
Traitor tracing is a kind of broadcast with traceability, which falls into the category of fingerprinting.
叛逆者追踪是一种可以追踪的广播加密算法,也属于数字指纹的范畴。
Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme.
利用不经意多项式估值协议,该文提出了一种新的非对称公钥叛逆者追踪方案。
A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.
公钥加密算法和追踪算法结合在一起,可构成一个公钥广播加密方案。
By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.
利用RS码和两锁密码协议构造了一种非对称的公钥叛逆者追踪方案。
A new model for electronic software distribution and copyright protection based on an asymmetric public-key traitor tracing scheme is designed.
基于一种非对称公钥叛逆者追踪方案给出了新的电子软件销售和产权保护模型,适用于一类需要安装运行的软件。
A new efficient traitor tracing scheme using bilinear mapping is presented in order to solve the user-key leaking problem in digital right management.
为了解决数字版权保护中的用户密钥泄漏问题,提出了一种基于双线性映射的叛逆者追踪方案。
In practice, traitor tracing schemes and broadcast encryption schemes can be effectively combined in order to minimize the damage as the result of piracy.
在实际中通常是把叛逆者追踪方案和广播加密方案有效地结合起来使盗版造成的损失最小化。
In this dissertation, the author focuses on how to apply the modern cryptography to construct traitor tracing scheme and digital copyright protection scheme.
在本文中,笔者着重研究如何利用现代密码技术来构造叛逆者追踪方案和数字版权保护方案。
Absrtact: Traitor tracing schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to content.
摘 要:当一些共谋者试图构造一个盗版的解码器以获取对数据内容非法访问的时候,叛逆者追踪模型可以用来发现至少其中的一个叛逆者。
At present, there are three kinds of traitor tracing schemes against collusion key attack, which are symmetrical traitor tracing schemes and dissymmetrical traitor tracing schemes;
目前,对抗共谋密钥攻击的叛徒追踪方案主要有对称追踪方案、非对称追踪方案、门限追踪方案;
At the same time, using the traitor tracing scheme, it constructs a kind of signing electronic license and software installation scheme which gives an efficient digital copyright protection scheme.
同时,利用此叛逆者追踪方案,构造出一种签发电子证书和软件安装方案,从而给出了一种有效的数字版权保护方案。
At the same time, using the traitor tracing scheme, it constructs a kind of signing electronic license and software installation scheme which gives an efficient digital copyright protection scheme.
同时,利用此叛逆者追踪方案,构造出一种签发电子证书和软件安装方案,从而给出了一种有效的数字版权保护方案。
应用推荐