Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Construction method for authorizing listener anonymity set in broadcasting program

A construction method and receiver technology, applied in the direction of broadcasting system control, electrical components, transmission systems, etc., can solve the problems of not being able to obtain any information, not including authorized receiver identity list information, and not intuitively displaying the identity of authorized receivers, etc. , to achieve the effect of solving the privacy protection problem

Inactive Publication Date: 2012-06-20
NORTHWESTERN POLYTECHNICAL UNIV +1
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the technical problem that the identity information of the authorized receiver is exposed when the existing method performs broadcast encryption, the present invention provides a method for constructing the anonymity set of the authorized receiver in the broadcast scheme, which uses the Lagrangian interpolation function to realize the The anonymous set structure of authorized receivers in the identity broadcast scheme does not contain the identity list information of authorized receivers in the broadcast message, so the identity of authorized receivers is not displayed intuitively, not only makes it impossible for attackers to obtain the information of authorized receivers, but also receives All authorized receivers of the same message cannot obtain any information of other authorized receivers except themselves, which can solve the privacy protection problem of authorized receivers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Construction method for authorizing listener anonymity set in broadcasting program
  • Construction method for authorizing listener anonymity set in broadcasting program
  • Construction method for authorizing listener anonymity set in broadcasting program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Glossary:

[0018] S: broadcast sender

[0019] n: the number of authorized recipients

[0020] i: integer

[0021] ID i : the identity information of the i-th user, where i=1, 2, ..., n

[0022] L: set of identity information of authorized receivers, L={ID 1 , ID 2 ,...,ID n}

[0023] v i : Authorization recipient ID i The secret information of , where i = 1, 2, ..., n

[0024] V: the set of secret information of each authorized recipient, V={v 1 , v 2 ,...,v n}

[0025] H(x): Hash function, x is an argument

[0026] x i : Interpolation abscissa, that is, the i-th interpolation abscissa of the Lagrangian interpolation function, satisfying x i =H(ID i )

[0027] x: independent variable

[0028] the y i : Interpolation ordinate, that is, the interpolation ordinate corresponding to the i-th interpolation abscissa of the Lagrangian interpolation function

[0029] f i (x): Lagrangian interpolation basis function

[0030] j: integer

[0031] a j,i : ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a construction method for authorizing listener anonymity set in a broadcasting program, which solves the technical problem of the prior art that: when the broadcasting is encrypted, the authorized listener identity information is exposed. A Lagrange interpolation function is used to realize the construction of the anonymity set of the authorized listener in the broadcasting program based on identity and the broadcasting information does not contain the authorized listener identity list information. The identity of the authorized listener is not directly visually shown, thus the information of the authorized listener can not be obtained by an attacker and all the authorized listeners which receive a same message can not obtain any information from other authorized listeners except itself, therefore the privacy protection problem of the authorized listeners can not be solved.

Description

technical field [0001] The invention relates to a method for constructing an anonymous set, in particular to a method for constructing an anonymous set of authorized receivers in a broadcast scheme. Background technique [0002] In network transmission applications, such as wireless broadcasting, pay TV and other related security solutions, most of them do not consider the privacy of authorized receivers, and directly expose the identity information of authorized receivers in broadcast messages. [0003] The document "Efficient Multi-Receiver Identity-Based Encryption and Its Application to Broadcast Encryption. PCK 2005, Lecture Notes in Computer Science, 2005, Volume 3386 / 2005, 380-397" discloses an identity-based broadcast encryption algorithm, which implements a Encrypt the multi-broadcast so that each authorized receiver can use his own private key to decrypt the broadcast message and obtain the plaintext message. This method calculates a specific information for each ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04H60/23
Inventor 李慧贤崔静静庞辽军裴庆祺刘能宾王掌权何利伟
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products