- 1、本文档共18页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
Broadcast Encryption Scheme π
Broadcast Encryption Scheme π ?
Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, and Eun Sun Yoo
ISaC and Department of Mathematical Sciences, Seoul National University,
Seoul 151-747, Korea
{ drake, jhcheon, mhkim, eunsun}@math.snu.ac.kr
Abstract. We propose a new broadcast encryption scheme π based on the idea of
‘one key per each punctured interval’. Let N and r be the numbers of total users and
revoked users, respectively. In our scheme with p-punctured c-intervals, the transmis-
sion overhead is asymptotically rp+1 as r grows. We also introduce two variants of
our scheme to improve the efficiency for small r. Our scheme is very flexible with two
parameters p and c. We may take p as large as possible if a user device allows a large
key storage, and set c as small as possible if the storage size and the computing power
is limited. Our scheme also possesses another remarkable feature that any number
of new users can join at any time without key refreshment, which is not possible in
other known practical schemes.
1 Introduction
Broadcast encryption (BE) is a cryptographic method for a center to efficiently
broadcast digital contents to a large set of users so that only non-revoked users
can decrypt the contents. BE has a wide range of applications such as internet or
mobile broadcast of movies, news or games, pay TV, and even CD or DVD, to name
a few.
In broadcast encryption, the center distributes to each user u the set Ku of keys,
called the user key set of u, in the system setup stage. We assume that the user
keys are not updated afterwards, that is, user keys are stateless. A session is a time
interval during which only one encrypted message (digital contents) is broadcasted.
The session key, say SK, is the key used to encrypt the contents of the session.
In order to broadcast a message M , the center encrypts M using the session key
SK and broadcasts the encrypted message together with a header, which contains
encryptions of SK and the information for non-revoked u
您可能关注的文档
- Attendance Regulation.pdf
- Attendance Demo..ppt
- Attraction and ionic correlations between charged stiff polyelectrolytes.pdf
- Attractive people Assembling loose-limbed models using non-parametric belief propagation.pdf
- Attitude Toward Work.ppt
- Attractive and repulsive contributions of medium fluctuations to nuclear superfluidity.pdf
- Attwood and Pawlak 2011 Neuropsin and EphB2 nature09938.pdf
- attractive cycles in a.pdf
- ATU自动路测回放软件操作使用手册.pdf
- ATV71HU75N4 DATASHEET.pdf
最近下载
- 社会组织会费票据管理制度(范本).pdf VIP
- 代理记账业务内部管理规范制度范本.docx(核实添加无关内容) VIP
- 《公路沥青路面施工技术规范》(F40-2004 )【可编辑】.docx VIP
- 光的人眼非视觉生物效应作用剂量 编制说明.pdf
- 多准:天猫啤酒2022年趋势报告.pdf VIP
- 2025年高考政治复习知识清单必修一《中国特色社会主义》【答题模板】.pdf VIP
- 苏S01-2012给水排水图集(无水印).docx VIP
- 制瓶机供料机.doc VIP
- 加油站防汛应急预案.docx VIP
- 泌尿外科利用PDCA循环降低持续膀胱冲洗患者膀胱痉挛的发生率品管圈.pptx VIP
文档评论(0)