期刊文献+

广播加密方案研究 被引量:4

A Survey of Research on Broadcast Encryption
在线阅读 下载PDF
导出
摘要 广播加密作为一种将数据内容通过广播信道安全地分发给合法用户的安全机制,目前在付费电视、视频会议、无线传感网络等方面得到了广泛的应用。密钥存贮量、通信开销和计算开销是评价广播加密方案性能的主要指标。介绍了广播加密方案的发展和研究现状;对各类广播加密方案的基本原理、特点进行了阐述,并对方案的性能和应用进行了比较和总结;重点研究了其中的公钥广播加密方案,指出了由于公钥广播加密方案不需要信任中心,并且具有任何一个用户都可以广播数据的特点,在无线传感器网络方面有着很大的应用前景。 Broadcast encryption provides a convenient way to distribute digital content to subscribers over an insecure broadcast channel.It has been applied to various applications such as satellite TV subscription services,audio/video,wireless sensor networks,etc.The efficiency of a broadcast encryption scheme is mainly measured by three parameters:length of transmission messages,users' storage,and computational overhead.In this paper the current research and development of broadcast encryption schemes are introduced.Mechanisms and characteristic of various broadcast schemes are described,performances of schemes are compared and application scenarios are discussed.The application prospect of public-key broadcast schemes in wireless sensor network is pointed out lastly.
出处 《计算机技术与发展》 2010年第10期189-193,共5页 Computer Technology and Development
基金 国家自然科学基金(60873231) 江苏省自然科学基金(08KJB520006) 福建省网络安全与密码技术重点实验室开放课题(09A010)
关键词 广播加密 子集覆盖 无状态接收者 无线传感器网络 broadcast encryption subset-cover stateless receiver wireless sensor networks
  • 相关文献

参考文献26

  • 1Berkovits S.How to broadcast a secret[C] //Proceedings of Eurocrpt.[s.l.] :Springer-Verlag,1991:536-541.
  • 2Fiat A,Naor M.Broadcast encryption[C] //Proceedings of Crypto.[s.l.] :Springer-Verlag,1993:480-491.
  • 3Wallner D M,Harder E J,Agee R C.Key management for multiast:issues and architectures[S].RFC 2627.1999.
  • 4Wong C K,Gouda M,Lam L S.Secure group communications using key graphs[C] //ACM SIGCOMM.[s.l.] :[s.n.] ,1998:68-79.
  • 5Perrig A,Song D,Tygar J D.A new protocol for efficient large-group key distribution[C] //Proceedings of the IEEE Symposium on Security and Privacy.[s.l.] :IEEE,2001:247-262.
  • 6Waldvogel M,Caronni G,Sun D,et al.The VersaKey framework:Versatile group key managemen[J].IEEE J.Sel.Areas Commun(Special Issue on Middleware),1999,17(9):1614-1631.
  • 7Mcgrew D A,Sherman A T.Key establishment in large dynamic groups using one way function trees[J].IEEE Transactions on Software Engineering,2003,29(5):444-458.
  • 8Canetti R,Garay J,Itkis G,et al.Multicast Security:A Taxonomy and Some Efficient Constructions[C] //proceedings of the IEEE INFOCOM.[s.l.] :IEEE,1999:708-716.
  • 9Canetti R,Malkin T,Nissim K.Efficient communication -storage tradeoffs for multicast encryption[C] //Advances in Cryptology EUROCRYPT.[s.l.] :Springer-Verlag,1999:459-474.
  • 10Naor D,Naor M,Lotspiech J.Revocation and Tracing Schemes for Stateless Receivers[C] //Proceedings of Crypto.[s.l.] :Springer-Verlag,2001:41-62.

同被引文献17

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部