2010 Second International Conference on Information Technology and Computer Science 2010
DOI: 10.1109/itcs.2010.54
View full text |Buy / Rent full text
|
Sign up to set email alerts
|

Abstract: An asymmetric traitor tracing scheme based on Luc public key cryptosystem is proposed. The scheme uses Shamir's secret sharing scheme. Comparing with existed schemes, the new scheme has some advantages.Firstly, we use the Luc public key cryptosystem in the scheme to increase the security. Secondly, the length of user key and data header is short. The scheme is asymmetric which means data supplier does not have all user's key. The user's key is made by user and data supplier. The data supplier is unable to fram… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 7 publications
(5 reference statements)
0
1
0
Order By: Relevance
“…Considering the security drawback of RSA [1] and Elgamal [2] public key algorithms, Smith and other researchers had proposed some new cryptosystems based on Lucas sequences [3][4] [5]. While these cryptosystems can resist some attacks that based on multiplicative property of modular exponentiation, their computation efficiency is not so satisfiable.…”
Section: Introductionmentioning
confidence: 99%
“…Considering the security drawback of RSA [1] and Elgamal [2] public key algorithms, Smith and other researchers had proposed some new cryptosystems based on Lucas sequences [3][4] [5]. While these cryptosystems can resist some attacks that based on multiplicative property of modular exponentiation, their computation efficiency is not so satisfiable.…”
Section: Introductionmentioning
confidence: 99%