期刊文献+

付费在线视频服务的加密实现方案研究

Implementation Research on Pay Online Video Services Encryption Scheme
下载PDF
导出
摘要 对付费在线视频服务加密方案进行了研究,通过采用属性基加密的机制来实现,对其访问控制结构A、安全参数生成、密钥分发共享、加解密过程、系统服务器端、客户端等部分都进行了研究,并设计了相应的类结构,最终通过程序运行验证了该方案的可行性。 The paper studied an encryption scheme for pay online video service, which was based on attribute encryption. Access control structure A, security parameter generation, key distribution sharing, encryption/decryption, server and client were studied and designed. The paper verified the scheme by processing program.
作者 耿欣
出处 《移动通信》 2016年第8期43-46,共4页 Mobile Communications
关键词 属性基加密 付费在线视频 双线性映射 attribute-based encryption pay online video bilinear mapping
  • 相关文献

参考文献10

  • 1Michel Abdalla, MihirBellare, Dario Catalano, et al. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions[J]. Journal of Cryptology, 2008,21(3): 350-391.
  • 2Michel Abdalla, Dario Catalano, Alexander W Dent, et al. Identity-based encryption gone wild[J]. In ICALP, 2014(2): 300-311.
  • 3Sattam S, A1-Riyami, John Malone-Lee, et al. Escrow-free encryption supporting cryptographic workow[J]. Int J Inf Sec, 2014,5(4): 217-229.
  • 4WalidBagga, Rek Molva, Stefano Crosta. Policy-based encryption schemes from bilinear pairings[J]. Acm Symposium on Information, 2006(3): 368-372.
  • 5Manuel Barbosa, PooyaFarshim. Secure cryptographic workow in the standard model[J]. INDOCRYPT, 2014(4): 379-393.
  • 6Amos Beimel. Secure Schemes for Secret Sharing and Key Distribution[J]. Israel Institute of Technology, Technion, Haifa, Israel, 2015(2) 377-385.
  • 7John Bethencourt, AmitSahai, Brent Waters. Ciphertextpolicy attribute-based encryp-tion[J]. IEEE Symposium on Security and Privacy, 2014(3): 321-334.
  • 8A Ivan, Y Dodis. Proxy cryptography revis-ited[J]. Proceedings of the Tenth Network and Distributed System Security Symposium, 2013,21(3): 244-251.
  • 9M Jakobsson. On quorum controlled asymmetric proxy re-encryption[J]. Lecture Notes in Computer Science, 1998,17(4): 632-639.
  • 10H Kim, J Baek, B Lee, et al. Computing with secrets for mobile agent using one-time proxy signature[J]. Proceedings of SCIS, 2013,11(4): 845-850.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部