International Conference on Computer Application and Information Security (ICCAIS 2021) 2022
DOI: 10.1117/12.2637501
|View full text |Cite
|
Sign up to set email alerts
|

Traitor tracing scheme for relational databases based on blockchain

Abstract: The traceability of data leakage remains a foundational challenge faced by big data. Traditional data tracing technology is mainly based on digital fingerprint to embed lengthy code into digital works such as video, while the structured data with limited embedding space has not been given adequate consideration. In this paper, we propose a chameleon short signature by improving Khalili's chameleon hash function and combining Boneh's signature algorithm to achieve a oneto-many signature with a shorter message l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…We compare the efficiency of the proposed AB-CS with the identity-based chameleon signature (IB-CHS) 4 and the chameleon short signature (CSS) [10] , in two aspects: time cost and energy consumption.…”
Section: Efficiency Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…We compare the efficiency of the proposed AB-CS with the identity-based chameleon signature (IB-CHS) 4 and the chameleon short signature (CSS) [10] , in two aspects: time cost and energy consumption.…”
Section: Efficiency Analysismentioning
confidence: 99%
“…The traitor tracing was proposed by Chor et al [3] to help information publishers identify the source of pirated decryption boxes or pirated decryption software released on the network. The traditional traitor tracking scheme [4][5][6] requires a central authority to maintain a mapping table between the user identity and the corresponding private key. Only the central authority can identify the traitor in the system, but as the number of users increases, the index mapping tables maintained by the central authority will also become larger, increasing the requirements for the performance of the central authority.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation