目 录
中文摘要
ABSTRACT
第一章 绪 论 ...............................................................................................................1
§1.1 研究背景 ...........................................................................................................1
§1.2 叛逆者追踪方案简介 .......................................................................................2
§1.3 本文研究概要和内容安排 ...............................................................................4
第二章 对称叛逆者追踪方案 .......................................................................................5
§2.1 概述 ...................................................................................................................5
§2.2 门限叛逆者追踪方案 .......................................................................................5
§2.2.1 密钥生成算法 .........................................................................................6
§2.2.2 构造使能块 .............................................................................................6
§2.2.3 加密 .........................................................................................................6
§2.2.4 解密 .........................................................................................................7
§2.2.5 追踪叛逆者 .............................................................................................7
§2.3 动态叛逆者追踪方案 .......................................................................................8
§2.3.1 动态叛逆者追踪方案简介 .....................................................................8
§2.3.2 动态叛逆者追踪方案分析 .....................................................................9
§2.3.3 其它动态叛逆者追踪方案 .....................................................................9
§2.4 K-完全恢复叛逆者追踪方案 .......................................................................10
§2.4.1 密钥生成算法 .......................................................................................10
§2.4.2 构造使能块 ...........................................................................................10
§2.4.3 加密 .......................................................................................................11
§2.4.4 解密 .......................................................................................................11
§2.4.5 追踪叛逆者 ...........................................................................................11
§2.5 对称公钥叛逆者追踪方案 .............................................................................12
§2.5.1 对称公钥叛逆者追踪方案简介 ...........................................................12
§2.5.2 对称公钥叛逆者追踪方案分析 ...........................................................13
§2.6 基于双线性对的叛逆者追踪方案 .................................................................14
§2.6.1 MSK 方案简介 ...................................................................................... 14
§2.6.2 MSK 方案分析 ...................................................................................... 16
第三章 非对称叛逆者追踪方案 .................................................................................18
§3.1 概述 .................................................................................................................18