一种新的加密方法及在数字数据版权保护中应用(英文)
作者:

A Novel Encryption Method with Its Application in the Copyright Protection of Digital Data
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [6]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    提出了一种新的具有多个私钥的加密方法.这种加密方法的安全性有赖于有限域上分组码译码问题的困难性.根据所提的加密算法,给出了一种适用于数字数据版权盗版跟踪方案.对于每一个数字数据的合法拷贝,给出的跟踪方案都分配一个分组码的码字与该拷贝的解密软件或者相关装置相对应.所提的方案能够有效地提取与解密软件或者装置相对应的码字,并进而利用所用分组码的译码算法找到所有参与非法拷贝制作的合法授权用户,其中,假设参与数字数据非法拷贝的合法用户数不超过所用码的纠错能力.与其他已有方案相比,所提方案具有更好的性能,并且容易实现.所提加密方案的潜在应用领域包括计算机软件、视频/音频等产品的数字数据版权保护方面.

    Abstract:

    A novel public key encryption scheme with multiple private keys is presented.The security of this encryption method depends on the difficulty of the decoding problem for block codes over finite fields.Based on the encryption method,a pirate tracing scheme is proposed for the copyright protection of digital data.In this tracing scheme,for each legal copy of digital data there is a codeword buried in the corresponding decryption software or box.The scheme can extract the codeword efficiently,and uncover all authorized users involved in making the illegal copy by using a proper decoding algorithm if the number of such users is not more than the error-correcting capacity of a given code.Compared with known tracing schemes,this scheme is efficient in performance,and easy in implementation.Potential applicable areas of the encryption method include the protection of copyrights of various forms of digital data such as computer software and audio/video products.

    参考文献
    [1] Boneh,D.,Franklin,M.An efficient public key traitor tracing scheme.In:Wiener,M.,ed.Advances in Cryptology:Proceedings of the Crypto'99.Lecture Notes in Computer Science,Vol.1666.Berlin:Springer-Verlag,1999.338~353.
    [2] Pfitzmann,B.,Sadeghi,A.R.Coin-Based anonymous fingerprinting.In:Stern,J.,ed.Advances in Cryptology:Proceedings of the EUROCRYPT'99.Lecture Notes in Computer Science,Vol.434.Berlin:Springer-Verlag,1999.150~164.
    [3] Chaband,F.On the security of some cryptosystems based on error-correcting codes.In:Santis,A.D.,ed.Advances in Cryptology:Proceedings of the EUROCRYPT'94.Lecture Notes in Computer Science,Vol.950.Berlin:Springer-Verlag,1995.131~139.
    [4] Tilborg,H.C.A.Coding theory at work in cryptology and vice versa.In:Pless,V.S.,Huffman,W.C.,eds.Handbook of Coding Theory (Part 2,Connections).Amsterdam:Elsevier Science B.V.,1998.1195~1227.
    [5] Pless,V.Introduction to the Theory of Error-Correcting Codes.3rd ed,New York:John Wiley & Sons,Inc.,1998.17~36.
    [6] Peterson,W.W.,Weldon,Jr.E.J.Error-Correcting Codes.2nd ed,Cambridge:The MIT Press,1988.40~115.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

马建峰,Chiam Teechye, Kot Chichung Alex.一种新的加密方法及在数字数据版权保护中应用(英文).软件学报,2002,13(3):330-334

复制
分享
文章指标
  • 点击次数:3494
  • 下载次数: 4857
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2000-09-15
  • 最后修改日期:2001-10-17
文章二维码
您是第19807598位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号