Broadcast encryption transmission method in network based on identification and centering on contents

A technology of broadcast encryption and transmission method, applied in transmission systems, public keys for secure communication, user identity/authority verification, etc., can solve the problem that IPSec cannot support data integrity or confidentiality protection, and achieve data source authentication. Effect

Inactive Publication Date: 2013-05-08
BEIJING JIAOTONG UNIV
View PDF4 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the content-centric network is oriented towards the transmission of information and content, and the terminal devices can transmit data without establishing a connection. Therefore, similar encryption protocols in current networks s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Broadcast encryption transmission method in network based on identification and centering on contents
  • Broadcast encryption transmission method in network based on identification and centering on contents
  • Broadcast encryption transmission method in network based on identification and centering on contents

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The preferred embodiments will be described in detail below in conjunction with the accompanying drawings. It should be emphasized that the following description is only exemplary and not intended to limit the scope of the invention and its application.

[0037] In the identity-based broadcast encryption transmission process in the content-centric network, firstly, an identity-based broadcast encryption scheme is used to generate a master key MSK and a public key PK, and the master key MSK is distributed to the private key generation center PKG, and the public key PK is public, and the private key generation center PKG uses the master key MSK and each user ID i , generate user private key SK for each user i And pass the user's private key SK through a secure channel i sent to the appropriate user.

[0038] Figure 5 It is a schematic diagram of an identity-based broadcast encryption transmission process in a content-centric network, and the method includes:

[0039...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses the technical field of network data transmission safety centering on contents and discloses a broadcast encryption transmission method in a network based on identification and centering on the contents. A content provider requests user identification through a broadcast interest package, a user can send identification information ID representing a public key to the content provider, the content provider uses a broadcast encryption algorithm based on the identification to encrypt plaintexts and then broadcasts the user, only a target user in user collection can decode the obtained plaintext contents, and the user collection can be composed of any user. When the user collection only has one user, a protocol is an end-to-end encryption transmission protocol. When the user collection has multiple users, the protocol is a broadcast encryption transmission protocol, and times of broadcast content encryption transmission are reduced. The method can enable the user identification to be added into the user collection to achieve content access controlling, and achieves data source authentication, data integrality and confidentiality protection based on an autograph of the identification and a broadcast encryption scheme.

Description

technical field [0001] The invention belongs to the content-centered network data transmission security technical field, in particular to an identity-based broadcast encryption transmission method in the content-centered network. Background technique [0002] The current Internet is established based on the TCP / IP architecture, which assumes that users and terminals are trustworthy, and the network only provides best-effort packet forwarding services. This initial Internet design goal of host interconnection and resource sharing makes the Internet fast develop. With the increasing variety of applications and computing models and the increasing dependence of society on the Internet, Internet access methods and network function positioning have undergone tremendous changes. , dynamics and security controllability and other aspects present unsolvable problems. In order to fundamentally solve these problems, researchers redesign the future Internet architecture and propose an ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04L12/18H04L29/08
Inventor 张宏科刘颖唐建强周华春
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products