期刊文献+

自我强化的基于身份的广播加密方案 被引量:1

Self-enforcing ID-based Broadcast Encryption Scheme
在线阅读 下载PDF
导出
摘要 为了有效解决广播加密系统中的密钥泄漏和密钥管理的问题,提出了一个新的实用的基于身份的广播加密方案。利用超椭圆曲线上的双线性对构造广播加密和解密算法,节省了广播通信传输带宽。引入了密钥自我强化保护机制,在分配用户密钥时通过用户的机密信息计算其解密密钥,降低了用户为保护自己的利益而泄漏其密钥的可能性。证明了方案在扩展的k元BDHI假设下对抗k用户合谋攻击的安全性。 To efficiently solve the private key leak and management problems in broadcast encryption systems, a new efficient practical ID-based broadcast encryption scheme was presented. The bilinear paring on a super-elliptic curve was used to construct the broadcast encryption and decryption algorithms, which greatly saves the broadcasting communication transmission bandwidth. In the key distribution process, self-enforcing protection strategy was introduced by computing one user' s decryption key through his secret information, which reduces the risk for one user of leaking his private keys. Security proof against k-collusion attack under the difficulty of extended k-BDHI assumption was given.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2007年第3期133-135,共3页 Journal of Sichuan University (Engineering Science Edition)
基金 教育部新世纪优秀人才支持计划资助项目 国家自然科学基金资助项目(90604009 60373104)
关键词 广播加密 密钥管理 双线性映射 公钥基础设施 broadcast encryption key management bilinear map Public Key Infrastructure (PKI)
  • 相关文献

参考文献10

  • 1Berkovits S.How to broadcast a secret[C]//Advances in Eurocrypt'91.Berlin:Springer-Verlag,1991:536-541.
  • 2Fiat A,Naor M.Broadcast encryption[C]//Proc of Crypto'93.Berlin:Springer-Verlag,1994:480-491.
  • 3Stinson D R,Wei R.Key preassigned traceability scheme for broadcast encryption[C]//Proc of SAC'98.Berlin:Springer-Verlag,1998:144-156.
  • 4Garay J,Staddon J,Wool A.Long-lived broadcast encryption[C]//Proc of CRYPTO'00.Berlin:Springer-Verlag,2000:333-352.
  • 5Halevi D,Shamir A.The LSD broadcast encryption Scheme[C]//Proc of Crypto'02.Berlin:Springer-Verlag.2002:47-60.
  • 6D'Arco P,Stinson D R.Fault tolerant and distributed broadcast encryption[C]//Proc of CT-RSA2003.Berlin:Springer-Verlag,2003:263-280.
  • 7Dwork C,Lotspiech J,Naor M.Digital signets:self-enforcing protection of digital content[C]//Proc of the 28th Symposium on the Theory of Computation.Berlin:Springer-Verlag,1996:489-498.
  • 8Du X,Wang Y,Ge J,et al.An ID-based broadcast encryption for key distribution[J].IEEE Transactions on Broadcasting,2005,51(2):264-266.
  • 9Mu Yi,Susilol W,Lin Yanxia.Identity-based broadcasting[C]//Proc of Indocrypt 2003.Berlin:Springer-Verlag,2003:177-190.
  • 10Boneh D,Lynn B,Shacham H.Short signatures from the Weil pairing[C]//Proc of Asiacrypt'01.Berlin:Springer-Verlag,2001:514-532.

同被引文献10

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部