期刊文献+

Implementing Broadcast Encryption Scheme Using Bilinear Map and Group Characteristic

Implementing Broadcast Encryption Scheme Using Bilinear Map and Group Characteristic
在线阅读 下载PDF
导出
摘要 This paper introduced a novel method for implementing broadcast encryption. Our scheme takes advantages of bilinear map and group characteristic, and shifts most of the storage overhead to the public device instead of storing in the tamper-proof device which is a major problem on current implementation. Furthermore, the broadcast keys in our scheme could be reused periodically resulting in more operational efficiency. This paper introduced a novel method for implementing broadcast encryption. Our scheme takes advantages of bilinear map and group characteristic, and shifts most of the storage overhead to the public device instead of storing in the tamper-proof device which is a major problem on current implementation. Furthermore, the broadcast keys in our scheme could be reused periodically resulting in more operational efficiency.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1554-1558,共5页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (60432030) Asian Media Research Center Foun-dation (AM0551)
关键词 broadcast encryption bilinear map access control broadcast encryption bilinear map access control
  • 相关文献

参考文献24

  • 1Waller D M;Harder E J;Agee R C.Key Management for Multicast Issues and Architecture(RFC 2627),1998.
  • 2Hwang Y H;Lee P J.Efficient Broadcast Encryption Scheme with Log-Key.Storage,2005.
  • 3Jho N S;Cheon J H;Kim M H.One-Way Chain Based Broadcast Encryption Schemes[C],2005.
  • 4Mihajevic M.Reconfigurable Key Management for Broadcast Encryption,2004(07).
  • 5Wong C;Gouda M;Lam S.Secure Group Communications Using Key Graphs[J],2000(01).
  • 6Fiat A;Naor M.Broadcast Encryption,1993.
  • 7Berkovits S.How to Broadcast a Secret,1991.
  • 8Gentry C;Ramzan Z.RSA Accumulator Based Broadcast Encryption[C],2004.
  • 9Tomoyuki A.A Revocation Scheme with Minimal Storage at Receivers[C],2002.
  • 10Mihaljevic M J;Imai H.Novel Method for Implementation of Certain Key Management Schemes to Minimize Secret Storage,2005.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部