{"title":"使用有限几何的可追溯性方案","authors":"I. Noskov, S. Bezzateev","doi":"10.1109/ICUMT.2018.8631278","DOIUrl":null,"url":null,"abstract":"In this paper, we consider traceability schemes that are used for traitor tracing. We use finite geometry such as affine geometry and projective geometry for making them. Then we modify traceability schemes to improve performance. And we describe the technique of embedding for traceability schemes.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Traceability Schemes Usings Finite Geometry\",\"authors\":\"I. Noskov, S. Bezzateev\",\"doi\":\"10.1109/ICUMT.2018.8631278\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we consider traceability schemes that are used for traitor tracing. We use finite geometry such as affine geometry and projective geometry for making them. Then we modify traceability schemes to improve performance. And we describe the technique of embedding for traceability schemes.\",\"PeriodicalId\":211042,\"journal\":{\"name\":\"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICUMT.2018.8631278\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICUMT.2018.8631278","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, we consider traceability schemes that are used for traitor tracing. We use finite geometry such as affine geometry and projective geometry for making them. Then we modify traceability schemes to improve performance. And we describe the technique of embedding for traceability schemes.