期刊文献+

新的随机化广播加密方案 被引量:1

New Randomized Broadcast Encryption Scheme
下载PDF
导出
摘要 提出一种新的随机化广播加密方案,通过构建随机函数族为用户分配密钥,可以使合法用户以概率1获取解密密钥,而用户的密钥存储仅为(l+1)个,与其他基于二叉树结构的方案相比,该方案在密钥存储量上具有显著优势,在一定条件下可使传输成本最小化。 Broadcast encryption scheme is a wildly used scheme in group security communication, which has good application foreground in such fields as pay-TV, video-conferencing, and Wireless Sensor Network(WSN). This paper presents a new randomized broadcast encryption scheme, which distributes keys for users by constructing family of random functions. It makes legal users gain decryption keys with probability as one, and the key storage number of users is (1+l). Compared with other schemes based on binary tree structure, this scheme has advantages in quantity of key storage, and it reduces transmission cost to minimum under some conditions.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第4期157-158,164,共3页 Computer Engineering
关键词 广播加密 随机函数族 多方退出 broadcast encryption family of random functions multiple revocation
  • 相关文献

参考文献5

  • 1Fiat A, Naor M. Broadcast Encryption[C]//Proc. of CRYPTO'94. Berlin, Germany: Springer-Verlag, 1994.
  • 2Scott C. New Constructions on Broadcast Encryption and Key Pre-distribution Schemes[C]//Proc. of IEEE Annual Joint Conf. on Computer and Communications Societies. Minnesota, USA:[s. n.], 2005.
  • 3赖霞,何明星.基于广播加密的会话密钥分配新方案[J].计算机工程,2008,34(5):155-157. 被引量:2
  • 4Naor M. Revocation and Tracing Schemes for Stateless Receivers[C]//Proc. of CRYPTO'01. Berlin, Germany: Springer- Verlag, 2001.
  • 5Hlevy D, Shamire A. The LSD Broadcast Encryption Scheme[C]// Proc. of CRYPTO'02. Berlin, Germany: Springer- Verlag, 2002.

二级参考文献5

  • 1匡建民,谷大武.广播加密方案的一个注记[J].计算机工程,2006,32(2):147-148. 被引量:2
  • 2Fiat A, Naor M. Broadcast Encryption[C]//Proc. of Conf. on Advances in Cryptology-CRYPTO'93. Berlin: Springer-Verlag, 1994:480-491.
  • 3Naor M. Revocation and Tracing Schemes for Stateless Receivers[C]//Proc. of Conf. on Advances in Cryptology- CRYPTO'01. Santa Barbara, California: [s. n.], 2001: 41-62.
  • 4Wong C K, Gouda M, Lam S. Secure Phs[J]. IEEE/ACM Transactions on Networking, 2000, 8(1): 16-30.
  • 5Mihaljevic M. Key Management Schemes for Stateless Receivers Based on Time Varying of Heterogeneous Logical Key Hierarchy[C]//Proc. of Conf. on Advances in Cryptology- Asiacrypt'03. Heidelberg: Springer-Verlag, 2003: 137-154.

共引文献1

同被引文献12

  • 1FIAT A, NAOR M. Broadcast encryption[ C]// CRYPTO 1993, LNCS 773. Berlin: Springer, 1993:480 - 491.
  • 2BONEH D, GENTRY C, WATERS B. Collusion resistant broadcast encryption with short ciphertexts and private keys[ C]// CRYPTO 2005, LNCS 3621. Berlin: Springer, 2005:258-275.
  • 3BAEK J, SAFAVI-NAINI R, SUSILO W. Efficient multi-receiver i- dentity-based encryption and its application to broadcast encryption [C]// PKC 2005, LNCS 3386. Berlin: Springer, 2005: 380- 397.
  • 4BARBOSA M, FARSHIM P. Efficient identity-based key encapsula- tion to multiple parties[C]//Cryptography and Coding 2005, LNCS 3796. Berlin: Springer, 2005:428 -441.
  • 5WATERS B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions [ C l// CRYPTO 2009, LNCS 5677. Berlin: Springer, 2009:619-635.
  • 6LEWKO A, SAHAI A, WATERS B. Revocation systems with very small private keys[ EB/OL]. [2012 - 10 -01]. http://eprint, ia- cr. org/2008/309.
  • 7MIHIR B, THOMAS R. Simulation without the artificial about: simplified proof and improved concrete security for Waters' IBE scheme[ C]// Advances in Cryptology EUROCRYPT 2009, LNCS 5479. Berlin: Springer, 2009:407 -424.
  • 8鲁力,胡磊.基于Weil对的多接收者公钥加密方案[J].软件学报,2008,19(8):2159-2166. 被引量:9
  • 9庞辽军,李慧贤,焦李成,王育民.可证明安全的多接收者公钥加密方案设计与分析[J].软件学报,2009,20(10):2907-2914. 被引量:12
  • 10廖志委,王晓明.基于秘密共享的广播加密方案[J].计算机应用,2011,31(4):978-980. 被引量:3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部