期刊文献+

一种基于身份分层结构加密算法的广播加密方案 被引量:8

A Broadcast Encryption Scheme Using Hierarchical Identity-based Encryption
下载PDF
导出
摘要 现今大部分的广播加密方案使用对称密钥作为用户密钥.为了解决消息发布方和用户持有相同对称密钥所带来的密钥泄漏问题,本文使用基于Weil配对性质的HIBE算法,利用子集覆盖框架下的完全子树方法构造了一种基于身份的广播加密方案.该方案使用用户的身份作为加密的公共密钥,因此无须单独的公钥/证书发布系统.同时该算法利用HIBE中的层次密钥算法,使得用户所需的私钥存储空间从O(logN)减少到O(1).本文最后对该方案的安全性、效率和动态可扩展性进行了讨论和分析.这种基于身份分层结构加密算法的广播加密方案是一种很有应用前景的适用于无状态接收装置的广播加密方案. Nowadays most of the broadcast encryption schemes are designed to work in symmetric key setting. The message distributor and client user have to keep the same symmetric keys,which leads to the problem of key compromise. In order to get a good solution to the problem,an ID-based broadcast encryption scheme was designed using the latest HIBE algorithm based on Weil Pairings and the complete subtree method under the subset cover framework. In this scheme, the user's ID was used as public key for encryption. So the public key/certificates distribution system was not necessary. And the number of private keys which users have to keep reduced from O(logN) to O(1) because of the key hierarchical generation in HIBE algorithm. Finally the cryptanalysis and the discussion of efficiency and dynamic extensibility were given as well. Therefore the broadcast encryption scheme using HIBE algorithm could be widely used for stateless receivers,especially in DRM fields.
出处 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第3期342-346,共5页 Journal of Xiamen University:Natural Science
基金 厦门大学985项目二期信息创新平台项目资助
关键词 子集覆盖 完全子树 广播加密 HIBE subset-cover complete subtree broadcast encryption hierarchical identity-based encryption
  • 相关文献

参考文献11

  • 1FiatA,Naor M.Broadcast encryption[C]//Proceedings of Crypto'93:LNCS 773.Berlin:Springer-Verlag,1993:480-491.
  • 2Naor D,Naor M,Lotspiech J.Revocation and tracing schemes for stateless receivers[C]//Proceedings of Crypto'01:LNCS 2139.Berlin:Springer-Verlag,2001:41-62.
  • 3Halevy D,Shamir A.The LSD broadcast encryption scheme[C]//Proceedings of Crypto'02:LNCS 2442.Berlin:Springer-Verlag,2002:47-60.
  • 4Goodrich M,Sun J,Tamassia R.Efficient tree-based revocation in groups of low-state devices[C]//Proceedings of Crypto'04:LNCS 3152.Berlin:Springer-Verlag,2004:511-527.
  • 5Dodis Y,Fazio N.Public key broadcast encryption for stateless receivers[C]//Proceedings of the Digital Rights Management Workshop 2002:LNCS 2696.Berlin:Springer-Verlag,2002:61-80.
  • 6Dodis Y,Fazio N.Public key broadcast encryption secure against adaptive chosen ciphertext attack[C]//Workshop on Public Key Cryptography PKC'03:LNCS 2567.Berlin:Springer-Verlag,2003:100-115.
  • 7Gentry C,Silverberg A.Hierarchical ID-based cryptography[C]//Proceedings of Asiacrypt 2002:LNCS 2501.Berlin:Springer-Verlag,2002:548-566.
  • 8Horwitz J,Lynn B.Towards hierarchical identity-based encryption[C]//Proceedings of Eurocrypt 2002:LNCS 2332.Berlin:Springer-Verlag,2002:466-481.
  • 9Boneh D,Boyen X,Goh E.Hierarchical identity based encryption with constant size ciphertext[C]//Proceedings of Eurocrypt 2005:LNCS 3494.Berlin:Springer-Verlag,2005:440-456.
  • 10Boneh D,Boyen X.Efficient selective-ID identity based encryption without random oracles[C]//Proceedings of Eurocrypt 2004:LNCS 3027.Berlin:Springer-Verlag,2004:223-238.

同被引文献78

  • 1谭作文,刘卓军,肖红光.一个安全公钥广播加密方案(英文)[J].软件学报,2005,16(7):1333-1343. 被引量:10
  • 2匡建民,谷大武.广播加密方案的一个注记[J].计算机工程,2006,32(2):147-148. 被引量:2
  • 3贾英涛,郑建德.J2EE平台双因素认证的设计与实现[J].厦门大学学报(自然科学版),2007,46(1):43-46. 被引量:2
  • 4瞿绍军,刘宏.家庭网络安全的研究[J].航空计算技术,2007,37(2):112-115. 被引量:3
  • 5Fiat A,Naor M.Broadcast encryption[C]//Stinson D.LNCS773:Advances in Cryptology-CRYPTO 1993.Berlin,Germany:Springer-Verlag, 1993:480-491.
  • 6Naor D,Naor M,Lotspiech J.Revocation and tracing schemes for stateless receiver[C]//Kilian J.LNCS2139:Advances in Cryptology- CRYPTO 2001.Berlin,Germany:Springer-Verlag,2001:41-62.
  • 7Halevy D,Shamir A.The LSD broadcast encryption scheme[C]// Yung M.LNcs2442:Advances in Cryptology-CRYPTO 2002,Berlin, Germany: Springer-Verlag, 2002: 47-60.
  • 8Dodis Y,Fazio N.Public key broadcast encryption for stateless receivers[C]//Feigenbaum J.LNSC2696:Proceedings of Digital Right Management Workshop 2002.Berlin,Germany:Springer-Verlag,2002: 61-80.
  • 9Horwitz J,Lynn B.Toward hierarchical identity-based encryption[C]// Knudsen L R.LNCS2332:Advances in Cryptology-EUROCRYPT 2002,Amsterdam,The Netherlands,April 28-May 2,2002.Berlin, Germany: Springer-Verlag, 2002 : 466-481.
  • 10Boneh D,Franklin M.Identity based encryption from the Weil pairing[C]//Kilian J.LNCS2139:Advances in Cryptology-CRYPTO 2001. Berlin : Springer-Verlag, 2001 : 213-229.

引证文献8

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部