A Novel Encryption Method with Its Application in the Copyright Protection of Digital Data
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [6]
  • |
  • Related [20]
  • |
  • Cited by [1]
  • | |
  • Comments
    Abstract:

    A novel public key encryption scheme with multiple private keys is presented.The security of this encryption method depends on the difficulty of the decoding problem for block codes over finite fields.Based on the encryption method,a pirate tracing scheme is proposed for the copyright protection of digital data.In this tracing scheme,for each legal copy of digital data there is a codeword buried in the corresponding decryption software or box.The scheme can extract the codeword efficiently,and uncover all authorized users involved in making the illegal copy by using a proper decoding algorithm if the number of such users is not more than the error-correcting capacity of a given code.Compared with known tracing schemes,this scheme is efficient in performance,and easy in implementation.Potential applicable areas of the encryption method include the protection of copyrights of various forms of digital data such as computer software and audio/video products.

    Reference
    [1] Boneh,D.,Franklin,M.An efficient public key traitor tracing scheme.In:Wiener,M.,ed.Advances in Cryptology:Proceedings of the Crypto'99.Lecture Notes in Computer Science,Vol.1666.Berlin:Springer-Verlag,1999.338~353.
    [2] Pfitzmann,B.,Sadeghi,A.R.Coin-Based anonymous fingerprinting.In:Stern,J.,ed.Advances in Cryptology:Proceedings of the EUROCRYPT'99.Lecture Notes in Computer Science,Vol.434.Berlin:Springer-Verlag,1999.150~164.
    [3] Chaband,F.On the security of some cryptosystems based on error-correcting codes.In:Santis,A.D.,ed.Advances in Cryptology:Proceedings of the EUROCRYPT'94.Lecture Notes in Computer Science,Vol.950.Berlin:Springer-Verlag,1995.131~139.
    [4] Tilborg,H.C.A.Coding theory at work in cryptology and vice versa.In:Pless,V.S.,Huffman,W.C.,eds.Handbook of Coding Theory (Part 2,Connections).Amsterdam:Elsevier Science B.V.,1998.1195~1227.
    [5] Pless,V.Introduction to the Theory of Error-Correcting Codes.3rd ed,New York:John Wiley & Sons,Inc.,1998.17~36.
    [6] Peterson,W.W.,Weldon,Jr.E.J.Error-Correcting Codes.2nd ed,Cambridge:The MIT Press,1988.40~115.
    Comments
    Comments
    分享到微博
    Submit
Get Citation

马建峰,Chiam Teechye, Kot Chichung Alex.一种新的加密方法及在数字数据版权保护中应用(英文).软件学报,2002,13(3):330-334

Copy
Share
Article Metrics
  • Abstract:3491
  • PDF: 4852
  • HTML: 0
  • Cited by: 0
History
  • Received:September 15,2000
  • Revised:October 17,2001
You are the first2032824Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063