期刊文献+

基于安全防诬码的加密广播方案

Encryption Broadcast Scheme Based on Secure Frameproof Codes
在线阅读 下载PDF
导出
摘要 提出了一种基于安全防诬码的加密广播方案。针对一种特权用户集大小受限的广播情形,利用安全防诬码构造了一种(n,k)-弹性加密广播方案。该方案只要求广播中心传输一次加密信息、用户存储一个密钥,就可完成广播任务。此外,特权用户集生成解密密钥的过程中,广播中心无需广播任何消息。相对于已有方案具有更低的系统带宽需求和存储复杂度。 This paper presents an encryption broadcast scheme based on secure frameproof codes.Using the secure frameproof codes,an(n,k)-resilient encryption broadcast scheme is constructed,which is applicable for an especially encryption broadcast situation where the privilege user set has an upper bound.The scheme can accomplish the broadcast task if the broadcast center transmits the encrypted message one time and the user stores only one key.And when the privileged user set recovers the decryption key,the broadcast center need not broadcast any message.The broadcast system bandwidth requirement and memory complexity are less than the existing schemes.
出处 《电子科技》 2013年第8期1-3,共3页 Electronic Science and Technology
基金 国家973计划基金资助项目(2012CB316103)
关键词 加密广播 安全防诬码 弹性加密方案 encryption broadcast secure frameproof code resilient encryption scheme
  • 相关文献

参考文献8

  • 1FIAT A,NAOR M. Broadcast encryption [ C] . Berlin Germa-ny :Advance in Cryptology - CRYPTOS , Springer - Verlag,1994,773:480-491.
  • 2CHOR B,FIAT A,NAOR M. Tracing traitors [C]. BerlinGermany : Advance in Cryptology - CRYPTO,Springer -Verlag, 1994,839:257 -270.
  • 3苏加军,刘景美,王新梅.一种改进的动态叛徒追踪方案[J].西安电子科技大学学报,2005,32(5):786-789. 被引量:1
  • 4张学军,王东勇,曾智勇,尹忠海.一种新的具有附加特性的叛逆者追踪方案[J].西安电子科技大学学报,2007,34(2):274-278. 被引量:7
  • 5STINSON D R,VAN TRUNG T,WEI R. Secure frameproofcodes,key distribution patterns,group testing algorithms andrelated structures [ J]. Journal of Statist Planning Inference,2000,7(2) :595 -617.
  • 6BONEH D, SHAW J. Collusion - secure fingerprinting fordigital data [ J]. IEEE Transactions on Information Theory,1998,44(5) :1897 -1905.
  • 7STADDON J N,STINSON D R,RUIZHONG WEI. Combinato-rial properties of frameproof and traceability codes [ J] . IEEETransactions on Information Theory,2001,47(3) :173 - 177.
  • 8TRI V L, MIKE B, HU Jiangyi. Short c - secure fingerprint-ing codes [ J]. Berlin Germany ; ISC 2003,LNCS 2851,Springer - Verlag,2003 :422 - 427.

二级参考文献6

  • 1马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 2Chor B, Fiat A, Naor M. Tracing Traitors[A]. Advance in Cryptology-CRYPTO'94: Vol 839[C]. Berlin: Springer-Verlag, 1994. 257-270.
  • 3Fiat A, Tassa T. Dynamic Traitor Tracing[A]. Advance in Cryptology-CRYPTO'99: Vol 1 666[C]. Berlin: Springer-Verlag, 1999. 354-371.
  • 4Safavi-Naini R, Wang Yejing. Squential Traitor Tracing[J]. IEEE Trans on Information Theory, 2003, 49(5): 1 319-1 326.
  • 5Fiat A, Naor M. Broadcast Encryption[A]. Advance in Cryptology-CRYPTO'93: Vol 773[C]. Berlin: Springer-Verlag, 1994. 480-491.
  • 6Boneh D, Shaw J. Collusion-secure Fingerprinting for Digital Data[J]. IEEE Trans on Information Theory, 1998, 44(5): 1 987-1 905.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部