By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.
Ma Hua et al's traitor tracing scheme based on RSA is analyzed, an obvious bug in which is found, and the problem is solved by introducing a random number.
Efficient traitor tracing scheme based on single cycle T-function
Collusion-resistant asymmetric public key traitor tracing scheme