期刊文献+

一个基于内插多项式的广播加密方案

A Broadcast Encryption Scheme Based on the Interpolating Polynomial
下载PDF
导出
摘要 该文提出了一种基于内插多项式的广播加密方案,消息发布者通过管理中心指定多个信息接收者,管理中心生成一个内插多项式,并公布相关的信息,合法用户根据自己的秘密信息和中心公布的消息,通过计算线段的中点来得到内插多项式,达到安全广播加密的目的。 A broadcast encryption scheme based on the interpolating polynomial is proposed. It allows the sender to designate multi-receivers to the Authority Center (AC). The interpolating polynomial is constructed and the related information is proclaimed by AC. The interpolating polynomial can be reconstructed by computing the central point of line segment to achieve the purpose of broadcasting safely by the legal users using their secret information and the public information published by AC.
出处 《电子与信息学报》 EI CSCD 北大核心 2008年第12期2996-2998,共3页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60273089) 陕西教育厅专项科研计划项目(06JK211) 陕西省自然科学基础研究计划项目(2006F37) 教育部科学技术研究重点项目(208139)资助课题
关键词 广播加密 内插多项式 安全广播 Broadcast encryption Interpolating polynomial Broadcast safely
  • 相关文献

参考文献10

  • 1Fiat A and Naor M. Broadcase Encryption. Stinson DR. Advances in Cryptology Crypto 93, Springer-Verlag, 1993: 480-491.
  • 2屈劲,葛建华,蒋铭.加密广播的密钥分发[J].西安电子科技大学学报,2002,29(3):310-313. 被引量:3
  • 3Boneh Dan and Gentry Craig. Collusion resistant broadcast encryption with short ciphertexts and private keys. Lecture notes in computer science, Springer, 2005: 258-275.
  • 4Attrapadung Nuttapong, Furukawa Jun, and Imai Hideki. Forward-secure and searchable broadcast encryption with short ciphertexts and private keys. ASIACRYPT2006, LNCS 2006. Vol. 4284: 161-177.
  • 5Chang C C and Wu T C. Broadcast cryptosystem in computer networks using interpolating polynomials.Computer System Science & Enginnering, 1991, 6(3): 185-188.
  • 6Wang Xu-zheng and Lin Ya-qi. A Scheme of Fast Key Recovery on Broadcast Network upon on the Three-centerlocation of a Triangle. Proceedings of 2000 Workshop on internet & Distributed Systems at MCKU, 2000. 10.
  • 7陈昭智,郑建德.一种基于身份分层结构加密算法的广播加密方案[J].厦门大学学报(自然科学版),2006,45(3):342-346. 被引量:8
  • 8谭作文,刘卓军,肖红光.一个安全公钥广播加密方案(英文)[J].软件学报,2005,16(7):1333-1343. 被引量:10
  • 9Lin J F and Chen S J. Comment on broadcasting cryptosystem in computer networks using interpolating polynomials. Computer Systems Science & Engineering, 1996 11(5): 315-317.
  • 10Shamir A. How to share a secret. Communications of the ACM, 1979, 22(4): 612-613.

二级参考文献33

  • 1Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPT0'93. LNCS 773, Berlin, Heidelberg: Springer-Verlag, 1994. 480-491.
  • 2Graray JA, Staddon J, Wool A. Longlived broadcast encryption. In: Bellare M, ed. Advances in Cryptology-CRYPTO 2000. LNCS 1880, Berlin, Heidelberg: Springer-Verlag, 2000. 333-352.
  • 3Luby M, Staddon J. Combinatorial bounds for broadcast encryption. In: Nyberg K, ed. Advances in Cryptology-EUROCRYPT'98. LNCS 1403, Berlin, Heidelberg: Springer-Verlag, 1998. 512-526.
  • 4Blundo C, Cresti A. Space requirements for broadcast encryption. In: De Santis A, ed. Advances in Cryptology-EUROCRYPT'94. LNCS 950, Berlin, Heidelberg: Springer-Verlag, 1995. 287-298.
  • 5Blundo C, Mattos LAF, Stinson DR. Trade-Offs between communication and storage in unconditionally secure scheme for broadcast encryption and interactive key distribution. In: Koblitz N, ed. Advances in Cryptology-CRYPTO'96. LNCS 1109, Berlin, Heidelberg: Springer-Verlag, 1996. 387-400.
  • 6Gafni E, Staddon J, Yin YL. Efficient methods for integrating traceability and broadcast encryption. In: Wiener M, ed. Advances in Cryptology-CRYPTO'99. LNCS 1606, Berlin, Heidelberg: Springer-Verlag, 1999. 372-387.
  • 7Kurosawa K, Yoshida T, Desmedt Y, Burmester M. Some bounds and a construction for secure broadcast encryption. In: Ohta K, Pei D, eds. ASIACRYPT'98. LNCS 1514, Berlin, Heidelberg: Springer-Verlag, 1998. 420-433.
  • 8Halevi D, Shamir A. The LSD broadcast encryption scheme. In: Yung M, ed. Advances in Cryptology-CRYPTO 2002. LNCS 2442, Berlin, Heidelberg: Springer-Verlag, 2002. 47-60.
  • 9Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO'2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 41-62.
  • 10Nao M, Pinkas B. Efficient trace and revoke schemes. In: Frankel Y, ed. Financial Cryptography FC'2000, LNCS 1962, Berlin, Heidelberg: Springer-Verlag, 2000. 1-20.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部