Unlock instant, AI-driven research and patent intelligence for your innovation.

ID-based broadcast encryption scheme containing customized information

A technology of broadcast encryption and identity information, applied in the field of cryptography and broadcast encryption scheme, can solve the problems of short public key length, large public key length, inability to meet personalized message transmission, etc., and achieve high efficiency and low bandwidth consumption. Effect

Active Publication Date: 2015-11-11
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, none of the above solutions can satisfy the transmission of personalized messages for a certain user while transmitting broadcast information.
[0006] In 2010, Ohtake and other scholars combined the BGW scheme with the Kurosawa scheme and proposed the first broadcast encryption scheme with personalized information. This scheme is based on bilinear mapping, but the length of the public key is very large, which increases linearly with the number of users.
Therefore, there is no scheme that can more efficiently combine the broadcast encryption system and the multi-receiver encryption system to produce an identity-based broadcast encryption scheme with personalized information with a short public key length.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ID-based broadcast encryption scheme containing customized information
  • ID-based broadcast encryption scheme containing customized information
  • ID-based broadcast encryption scheme containing customized information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] See image 3 The specific execution steps include the broadcast center setting system security parameters, generating the broadcast user set, identity space, generating the private key of each user in the set, the broadcast center encrypting the broadcast message and the personalized message for any user, and the recipient's decryption , The specific description is as follows:

[0027] (1) Set system parameters

[0028] (1.1) Suppose the system security parameter is k, p is a large prime number, and the broadcast user set is U={U 1 ,...,U n }, where n≥2. The identity information space is ID={0,1} n \{0 n }, where {0,1} n Represents a collection of n-bit long binary sequences, {0} n Represents a sequence of all 0s with a length of n bits. e means the source group is The target group is Of multilinear mapping, where All are cyclic multiplicative groups of order p. Represents a vector of length n+1 Represents a vector with length n+1 where the i+1 bit is 1, and the remai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an ID-based broadcast encryption scheme containing customized information, which belongs to the communication safety field. The scheme comprises the following steps that safety parameters are initialized; a broadcast center creates a set U of n users, ID spaces and generates a public key params, a main secret key msk and further makes the params public through a broadcast channel. The broadcast center acquires the ID information of a user Ui (Ui is one in the user set U) and generates a private key ski which is sent to the Ui. The broadcast center calculates a broadcast secret key K, the customized secret key K'i of Ui and a broadcast head Hdr. A symmetric encryption algorithm is used to encrypt broadcast information m (the secret key being K) to acquire c. The customized information m'i (the secret key being K'i) is encrypted to acquire c'i. (Hdr, c, c'i (i being within {1, ....,n}) are made public through the broadcast channel. Only users in the broadcast set U can perform the following steps of recovering the secret keys K and K'i from the Hdr through the private key; using k to decrypt c and acquire broadcast information; and using K'i to decrypt c'i and acquire customized information. The scheme is suitably used in broadcast systems containing customized information, for example, a condition receiving system. Meanwhile, customized information, security and collusion attack preventing services are provided for information transmission in the broadcast set.

Description

Technical field [0001] The invention relates to cryptography, belonging to the field of communication security, and in particular to an identity-based broadcast encryption scheme with personalized information. Background technique [0002] Broadcast encryption provides a way to securely transmit the same message to multiple different users at the same time on an insecure channel. It has a wide range of applications in the fields of digital pay TV, satellite communications, teleconferences, and FM radio. It was first proposed by Berkovits in the article "Howtobroadcastasecret" in 1991, and was later established as a new research field of cryptography in the article "broadcast encryption" in 1993 by AmosFiat and MoniNaor. [0003] The broadcast encryption system is divided into two types: symmetric broadcast encryption system and public key broadcast encryption system. The difference lies in whether the encryption party and decryption party use the same session key. The symmetric br...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 廖永建许珂乔莉杨晓伟
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA