Full metadata record
DC FieldValueLanguage
dc.contributor.author陳俊佑en_US
dc.contributor.authorJun-You Chenen_US
dc.contributor.author曾文貴en_US
dc.contributor.authorWen-Guey Tzengen_US
dc.date.accessioned2014-12-12T02:30:27Z-
dc.date.available2014-12-12T02:30:27Z-
dc.date.issued2002en_US
dc.identifier.urihttp://140.113.39.130/cdrfb3/record/nctu/#NT910394059en_US
dc.identifier.urihttp://hdl.handle.net/11536/70231-
dc.description.abstract當傳送者想要透過公開的頻道將資料廣播給合法接收者,而又不希望接收者之外的使用者能接收資料,則傳送者應該在廣播之前將資料先經過加密,只讓合法的接收者得以解開以得到資料。 在合法使用者中可能有人會洩漏他的金鑰以得到不當利益,為了避免這樣的情形,我們在一個廣播加密法中結合洩密者追蹤的能力。 在本篇中,我們應用了在編碼理論中的一個重要的方法:列表解碼法來提出應用列表解碼來進行洩密者追蹤的洩密者追蹤協定,並且利用門檻式私密分享的方法達到廢止使用者的功能。zh_TW
dc.description.abstractSenders may want to broadcast data to legal receivers via public channel, and they don’t like users that are not legal receivers to get the data. In this case, Senders should encrypt the data before they broadcast it, and only legal users have keys to decrypt them. Some of legal receivers may leak their keys to unauthorized member to gain benefits. The traitor tracing ability is embedded into broadcast encryption to catch traitors that leaks secrets. Our scheme combined an important method in coding theory, list decoding to propose a scheme that traces traitors using the list decoding algorithm, and we satisfy the requirement of revocation using the threshold secret sharing method.en_US
dc.language.isozh_TWen_US
dc.subject列表解碼zh_TW
dc.subject廣播加密法zh_TW
dc.subject洩密者追蹤zh_TW
dc.subject廢止zh_TW
dc.subjectBroadcast Encryptionen_US
dc.subjectTraitor Tracingen_US
dc.subjectRevocationen_US
dc.subjectList-decodingen_US
dc.title使用列表解碼法之洩密者追蹤與廢止協定zh_TW
dc.titleA Traitor Tracing and Revocation Scheme using List Decodingen_US
dc.typeThesisen_US
dc.contributor.department資訊科學與工程研究所zh_TW
Appears in Collections:Thesis