期刊文献+

一种广播加密机制的树再生长方法 被引量:1

Broadcast Encryption Tree’s Regrowth Method
下载PDF
导出
摘要 广播加密技术是一种安全群组通信的技术,在付费电视、电话会议、数字内容的网络发布等领域有广泛应用。在对现有广播加密机制进行比较和分析的基础上,该文提出了一种广播加密机制的用户端扩展方法,通过逻辑密钥树的再生长,解决了子集差分机制/分层子集差分机制无法扩展用户端的问题,可以在不影响系统原有用户的预分配密钥和解密处理的基础上,动态批量地扩展系统的用户端。 Broadcast encryption can allow a center to broadcast secure transmission to an arbitrary set of recipients, which is popular in pay TV, telephone conference and so on. Based on the comparison and analysis of the existing broadcast encryption schemes, this paper proposes a broadcast encryption tree's regrowth method. By making the logical key tree grow bottom-up, this method can add new users in batches without influencing the previous users. So it solves subset and layered subset difference scheme's unscalability.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第22期169-171,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2005AA103320)
关键词 广播加密 子集差分 分层子集差分 broadcast encryption subset difference layered subset difference
  • 相关文献

参考文献5

  • 1Berkovits S.How to Broadcast a Secret[C]//Proceedings of EUROCRYPT'91.[S.1.]:Springer,1991:536-541.
  • 2Amos F,Naor M.Broadcast Encryption[C]//Proceedings of Advances in Cryptology'93.[S.1.]:Springer-Verlag,1993:481-491.
  • 3Lotspiech J,Nusser S,Pestonoi F.Anonymous Trust:Digital Rights Management Using Broadcast Encryption[J].Proceedings of the IEEE,2004,92 (6):898-909.
  • 4Naor D,Naor M,Lotspiech J.Revocation and Tracing Schemes for Stateless Receivers[C]//Proc.of CRYPTO.'01.2001:41-62.
  • 5Halevi D,Shamir A.The LSD Broadcast Encryption Scheme[C]// Proc.of CRYPTO.'02.[S.1.]:Springer,2002:47-60.

同被引文献10

  • 1Cui Y,Widom J,Wiener J.Tracing the Lineage of View Data in a Warehousing Environment[J].ACM Transactions on Database Systems (TODS),2000,25(2):179-227.
  • 2Buneman P,Khanna S,Tan W.Why and Where:A Characterization of Data Provenance[C] // In Proceedings of the 8th International Conference on Database Theory (ICDT),2001:316-330.
  • 3Buneman P,Khanna S,Tan W.On Propagation of Deletions and Annotations Through Views[C] // In Proceedings of the ACM Symposium on Principles of Database Systems (PODS),Wisconsin,Madison,2002:50-158.
  • 4Wang-C T.Containment of relational queries with annotation propagation[C] // In Proceedings of the International Workshop on Database and Programming Languages (DBPL),Potsdam,Germany,2003:109-110.
  • 5Bhagwat D,Chiticariu L,Tan W,etal.An Annotation Management System for Relational Databases[C] // In Proceedings of the International Conference on Very Large Data Bases (VLDB),2004:900-911.
  • 6Buneman P,Chapman A,Cheney J.Provenance management in curated databases[C] // Proceedings of the 2006 ACM SIGMOD international conference on Management of data,2006:539-550.
  • 7Chapman A,Jagadish H V,Ramanan P.Efficient provenance storage[C] // Proceedings of the 2008 ACM SIGMOD international conference on Management of data,2008:993-1006.
  • 8Davidson S,Cohen-Boulakia S,Eyal A,et al.Provenance in scientific workflow systems[J].IEEE Data Engineering Bulletin,2007,32(4):1-7.
  • 9Ragib Hasan,Radu Sion,Marianne Winslett.The case of the fake picasso:Preventing history forgery with secure provenance[C] // In Proc.of the 7th USENIX conference on File and Storage Technologies,2009.
  • 10Halevy D,Shamir A.The LSD broadcast encryption scheme[C] // Lecture Notes in Computer Science,2002:47-60.

引证文献1

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部