期刊文献+

基于RSA的广播加密方案

Broadcast encryption scheme from RSA
下载PDF
导出
摘要 为提高广播加密系统的实用性和效率,通过采用不同模余下的授权用户成员的群密钥分发策略,构造了一个新的基于RSA加密方案的广播加密方案,可以进行安全的群密钥分发,并能够有效地实现无需密钥更新的新成员的动态加入.该方案减少了通信传输带宽以及用户的密钥存储量(仅需一个群元素),并且其加解密的计算代价与RSA加密方案相当.分析了该方案的效率,并在RSA假设下证明了该方案在任意用户的合谋攻击下的安全性. To improve practicability and efficiency of the broadcast encryption system, a new broadcast encryption scheme based on RSA encryption scheme is constructed through the exploitation of group key distribution strategy for authorized users under different modulus. It may securely realize group key distribution and ensure dynamic join for new users without any key update computation. Both the communication transmission bandwidth and key storage size of each user in the scheme are greatly reduced (only one group element), while the encryption-decryption computation cost is about the same as RSA scheme. The efficiency of the scheme is analyzed, and the collusion-resistance security proof under the RSA assumption is given as well.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第A01期86-89,共4页 Journal of Southeast University:Natural Science Edition
基金 国家自然科学基金资助项目(60502046 90604009) 国家高技术研究计划(863计划)资助项目(2007AA01Z215)
关键词 广播加密 密钥分发 RSA加密方案 数字版权保护 broadcast encryption key distribution RSA encryption scheme digital right management
  • 相关文献

参考文献10

  • 1Berkovits S. How to broadcast a secret [ C]//Proc of Eurocrypt'9 LNCS. Berlin: Springer-Verlag, 1991 : 536-541. 被引量:1
  • 2Halevi D, Shamir A. The LSD broadcast encryption Scheme [C]//Proc of Crypto'02 LNCS. Berlin: Springer-Verlag, 2002: 47-60. 被引量:1
  • 3Boneh D, Gentry C. Collusion resistant broadcast encryption with short ciphertexts and private keys[C]// 25th Annual International Cryptology Conference. Heidelberg: Springer, 2005:258-275. 被引量:1
  • 4D'Arco P, Stinson D R. Fault tolerant and distributed broadcast encryption [C]// Proc of CT-RSA2003 LNCS. Berlin: Springer-Verlag, 2003:263-280. 被引量:1
  • 5Sakai R, Furukawa J. Identity-based broadcast encryption [EB/OL]. (2007-02-15)[2007-02-17]. http://eprint.iacr.org.pdf. 被引量:1
  • 6Du X, Wang Y, Ge J,et al. An ID-based broadcast encryption for key distribution [J]. IEEE Transactions on Broadcasting, 2005, 51 (2):264-266. 被引量:1
  • 7Mu Yi, SusilolWilly, Lin Yan-Xia. Identity-based broadcasting [C]//Proc of Indocryot'03 LNCS. Berlin: Springer-Verlag, 2000:177-190. 被引量:1
  • 8Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosystems [J]. Communications of the ACM, 1978, 21(2): 120-126. 被引量:1
  • 9Boneh D. Twenty years of attacks on the RSA cryptosystem [J]. Notices of the American Mathematical Society, 1999, 46(2):203-213. 被引量:1
  • 10Bellare M, Rogaway P. Optimal asymmetric encryption[C]// Proc of Eurocrypt'94 LNCS. Berlin: Springer-Verlag, 1995:92-111. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部