设计了两种叛逆者追踪方案。
对已有叛逆者追踪方案的性能进行了分析总结。
Analyze and summarize the performance of the presented traitor tracing schemes in detail.
基于纠错码的叛逆者追踪模型是通过纠错码来构造的。
ECC - based traitor tracing scheme is constructed with an error correcting code.
利用RS码和两锁密码协议构造了一种非对称的公钥叛逆者追踪方案。
By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.
叛逆者追踪是一种可以追踪的广播加密算法,也属于数字指纹的范畴。
Traitor tracing is a kind of broadcast with traceability, which falls into the category of fingerprinting.
利用不经意多项式估值协议,该文提出了一种新的非对称公钥叛逆者追踪方案。
Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme.
在实际中通常是把叛逆者追踪方案和广播加密方案有效地结合起来使盗版造成的损失最小化。
In practice, traitor tracing schemes and broadcast encryption schemes can be effectively combined in order to minimize the damage as the result of piracy.
在本文中,笔者着重研究如何利用现代密码技术来构造叛逆者追踪方案和数字版权保护方案。
In this dissertation, the author focuses on how to apply the modern cryptography to construct traitor tracing scheme and digital copyright protection scheme.
为了解决数字版权保护中的用户密钥泄漏问题,提出了一种基于双线性映射的叛逆者追踪方案。
A new efficient traitor tracing scheme using bilinear mapping is presented in order to solve the user-key leaking problem in digital right management.
为了解决数字版权保护中的用户密钥泄漏问题,提出了一种基于双线性映射的叛逆者追踪方案。
Based on digital watermarking and applied cryptology, an authentication scheme for copyright protection of digital product is proposed.
基于一种非对称公钥叛逆者追踪方案给出了新的电子软件销售和产权保护模型,适用于一类需要安装运行的软件。
A new model for electronic software distribution and copyright protection based on an asymmetric public-key traitor tracing scheme is designed.
同时,利用此叛逆者追踪方案,构造出一种签发电子证书和软件安装方案,从而给出了一种有效的数字版权保护方案。
At the same time, using the traitor tracing scheme, it constructs a kind of signing electronic license and software installation scheme which gives an efficient digital copyright protection scheme.
摘 要:当一些共谋者试图构造一个盗版的解码器以获取对数据内容非法访问的时候,叛逆者追踪模型可以用来发现至少其中的一个叛逆者。
Absrtact: Traitor tracing schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to content.
当发生盗版时,数据发行商不但可以追踪到叛逆者,而且可以通过更新用户的码向量来废除叛逆者的秘密钥的解密能力。
When the piracy occurring, the data supplier not only can trace the traitor but also can revoke the decryption ability of the traitor's private key by updating the code vectors of the users.
利用该方案可以准确地追踪到所有的叛逆者。
利用该方案可以准确地追踪到所有的叛逆者。
应用推荐