期刊文献+

基于对等网络的家庭网络系统广播加密算法应用研究 被引量:1

Broadcast Encryption Algorithm Application Research in A Home Network Based on the Peer-to-peer Network
在线阅读 下载PDF
导出
摘要 在一种三层结构的家庭网络组网结构中,使用广播加密算法以实现客户的认证以及文件和流媒体内容的传输。借鉴一种已经提出的广播加密方案,基于Tate配对性质的HIBE算法进行改进,可以抵御重放攻击,防止密钥泄漏。 This paper describes a scheme to use broadcast encryption on a three-layer home network structure. The idea based on pre-distributed symmetric keys,which with minimal reliance on public key cryptographic operations. The architecture not require continuous network connectivity on devices. It allows efficient and flexible key updating and revocation.
作者 杨筱倩
机构地区 电子科技大学
出处 《重庆科技学院学报(自然科学版)》 CAS 2008年第3期90-93,共4页 Journal of Chongqing University of Science and Technology:Natural Sciences Edition
基金 国家自然科学基金"对等网络中的分布式路由算法技术研究"(60473090) 电子科技大学青年科技基金项目(JX04029) 电子科技大学青年博士学科平台建设项目"对等计算实验室"(05BS00602) 国家242信息安全专题计划"P2P网络仿真"(2006B19)
关键词 家庭网络 广播加密 子集覆盖 HIBE home network broadcast encryption subset-cover hierarchical identity-based encryption
  • 相关文献

参考文献10

  • 1FiatA,NaorM. Broadcast encryption[A]. Proceedings of Crypto'93.- LNCS 773 [C]. Berlin:Springer-Verlag, 1993. 480-491.
  • 2Naor D, Naor M, Lotspiech J. Revocation and Tracing Schemes for Stateless Receivers [A]. Proceedings of Crypto'01: LNCS 2139[C]. Berlin:Springer-Verlag, 2001.41-62.
  • 3D Boneh, M Franklin. Identity Based Eneryption from the Well Pairing[Z]. Berlin: Springer-Verlag, 2001, 213-229.
  • 4Goodrich M, Sun J, Tamassia R. Efficient Tree-based Revocation in Groups of Low-state Devices[A]. Proceed- ings of Crypto'04: LNCS 3152[C]. Berlin: Springer-Verlag, 2004. 511-527.
  • 5Boneh D, Boyen X, Goh E. Hierarchical Identity Based Encryption with Constant Size Ciphertext [A]. Proceedings of Eurocrypt 2005:LNCS 3494[C]. Berlin: Springer Verlag, 2005. 440-456.
  • 6Boneh D, Boyen X. Efficient Selective-ID Identity Based Encryption Without Random Oracles[A]. Proceedings of Eurocrypt 2004: LNCS 3027[C]. Berlin: Springer-Verlag, 2004. 223-238.
  • 7Gentry C, Silverberg A. Hierarchical ID-based Cryptography[A]. Proceedings of Asia crypt 2002: LNCS 2501 [C]. Berlin: Springer-Verlag,2002: 548-566.
  • 8Joux A. The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems [A]. Proc of 15th Algorithmic Number Theory Symposium (LNCS 2369)[C]. Berlin: Springer-Verlag, 2002 : 20-32
  • 9瞿绍军,刘宏.家庭网络安全的研究[J].航空计算技术,2007,37(2):112-115. 被引量:3
  • 10陈昭智,郑建德.一种基于身份分层结构加密算法的广播加密方案[J].厦门大学学报(自然科学版),2006,45(3):342-346. 被引量:8

二级参考文献20

  • 1彭海清,冯涛,童登金.家庭网络的关键技术、业务及标准化[J].电信科学,2004,20(11):5-9. 被引量:8
  • 2FiatA,Naor M.Broadcast encryption[C]//Proceedings of Crypto'93:LNCS 773.Berlin:Springer-Verlag,1993:480-491.
  • 3Naor D,Naor M,Lotspiech J.Revocation and tracing schemes for stateless receivers[C]//Proceedings of Crypto'01:LNCS 2139.Berlin:Springer-Verlag,2001:41-62.
  • 4Halevy D,Shamir A.The LSD broadcast encryption scheme[C]//Proceedings of Crypto'02:LNCS 2442.Berlin:Springer-Verlag,2002:47-60.
  • 5Goodrich M,Sun J,Tamassia R.Efficient tree-based revocation in groups of low-state devices[C]//Proceedings of Crypto'04:LNCS 3152.Berlin:Springer-Verlag,2004:511-527.
  • 6Dodis Y,Fazio N.Public key broadcast encryption for stateless receivers[C]//Proceedings of the Digital Rights Management Workshop 2002:LNCS 2696.Berlin:Springer-Verlag,2002:61-80.
  • 7Dodis Y,Fazio N.Public key broadcast encryption secure against adaptive chosen ciphertext attack[C]//Workshop on Public Key Cryptography PKC'03:LNCS 2567.Berlin:Springer-Verlag,2003:100-115.
  • 8Gentry C,Silverberg A.Hierarchical ID-based cryptography[C]//Proceedings of Asiacrypt 2002:LNCS 2501.Berlin:Springer-Verlag,2002:548-566.
  • 9Horwitz J,Lynn B.Towards hierarchical identity-based encryption[C]//Proceedings of Eurocrypt 2002:LNCS 2332.Berlin:Springer-Verlag,2002:466-481.
  • 10Boneh D,Boyen X,Goh E.Hierarchical identity based encryption with constant size ciphertext[C]//Proceedings of Eurocrypt 2005:LNCS 3494.Berlin:Springer-Verlag,2005:440-456.

共引文献9

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部