###
DOI:
Journal of Software:2005.16(7):1333-1343

一个安全公钥广播加密方案
谭作文,刘卓军,肖红光
(中国科学院,数学与系统科学院,系统科学研究所,北京,100080;信息安全国家重点实验室,中国科学院,研究生院,北京,100049;长沙理工大学,电子信息工程系,湖南,长沙,410076)
A Fully Public Key Tracing and Revocation Scheme Provably Secure Against Adaptive Adversary
TAN Zuo-Wen,LIU Zhuo-Jun,XIAO Hong-Guang
()
Abstract
Chart / table
Reference
Similar Articles
Article :Browse 3341   Download 3001
Received:April 07, 2004    Revised:July 06, 2004
> 中文摘要: 消息的发送者使用广播加密算法通过广播信道将消息发送给用户.公钥加密算法和追踪算法结合在一起,可构成一个公钥广播加密方案.提出了一个完全式公钥广播加密方案.在以往公钥广播加密方案中,消息发送中心替每个用户选择解密私钥,分配解密私钥.而在完全式公钥广播加密方案中,用户的解密私钥是由用户自己所选择的.用户可以随时加入或退出广播系统.当消息发送者发现非法用户时,不要求合法用户作任何改变,就能够很方便地取消这些非法用户.此外,证明了方案中加密算法在DDH假设和适应性选择密文攻击下是安全的.
Abstract:A broadcast encryption allows the sender to securely distribute content to a dynamically changing group of users over a broadcast channel. A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm. This paper proposes a fully public key tracing and revocation scheme. The salient feature of the scheme is that the secret keys of the users are chosen by the users themselves, while in the previous public key broadcast encryption schemes, the broadcaster publishes the encryption key and distributes the individual secret keys to the users. The scheme deals with the setting of stateless receivers. When the traitors are found, the sender can revoke them without involvement of the remaindering receivers. The encryption algorithm in the scheme is semantically secure against adaptive chosen cipher-text attacks based on the DDH assumption.
文章编号:     中图分类号:    文献标志码:
基金项目:Supported by the National Natural Science Foundation of China under Grant No.10371127 (国家自然科学基金) Supported by the National Natural Science Foundation of China under Grant No.10371127 (国家自然科学基金)
Foundation items:
Reference text:

谭作文,刘卓军,肖红光.一个安全公钥广播加密方案.软件学报,2005,16(7):1333-1343

TAN Zuo-Wen,LIU Zhuo-Jun,XIAO Hong-Guang.A Fully Public Key Tracing and Revocation Scheme Provably Secure Against Adaptive Adversary.Journal of Software,2005,16(7):1333-1343