Unlock instant, AI-driven research and patent intelligence for your innovation.

polymorphic encryption key matrix

A technology of encryption key and cipher key, applied in the field of broadcast encryption

Active Publication Date: 2018-09-25
INT BUSINESS MASCH CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Receive encrypted content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • polymorphic encryption key matrix
  • polymorphic encryption key matrix
  • polymorphic encryption key matrix

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] The key matrix can be used for space-efficient key distribution in broadcast encryption systems. In the key matrix approach, an authorized content consumer (eg, a digital media player) applies a one-way encryption function to traverse the key matrix from column to column. At each step of the traversal, the encryption key is derived, and the process is repeated until the target key is obtained. Authorized clients are assigned a unique smaller set of device keys associated with specific rows in specific columns of the key matrix. When an authorized client applies an encryption function with one of its device keys, a new key is generated. This new key applies to cells in subsequent columns. Repeating this process eventually yields a final decryption key that can be used to decrypt protected content. The key matrix approach allows key combinations to be revoked by modifying data included in subsequently distributed protected content (the media key block discussed below)....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention relate to space-efficient key distribution in broadcast encryption systems. In one embodiment, a method and computer program product for broadcast encryption are provided. In this embodiment, the key bundle is read. The key bundle includes a first cryptographic key, an associated first key identifier, and an associated first cryptographic function identifier. Receive encrypted content. Receive multiple encryption keys. Each encryption key has an associated identifier. A first encryption key is selected from a plurality of encryption keys such that the identifier of the first encryption key corresponds to the first key identifier. A first cryptographic function corresponding to the first cryptographic function identifier is determined. A first cryptographic function is applied to the first encryption key using the first cryptographic key to obtain a first intermediate cryptographic key. A content encryption key is determined using the first intermediate encryption key. Apply a content cipher key to encrypted content to obtain decrypted content.

Description

Background technique [0001] Embodiments of the invention relate to broadcast encryption, and more particularly, to space-efficient key distribution in broadcast encryption systems. Contents of the invention [0002] problem solution [0003] According to one embodiment of the present invention, a method and computer program product for broadcast encryption are provided. In this embodiment, the key bundle is read. The key bundle includes a first cryptographic key, an associated first key identifier, and an associated first cryptographic function identifier. Receive encrypted content. Receive multiple encryption keys. Each encryption key has an associated identifier. A first encryption key is selected from a plurality of encryption keys such that the identifier of the first encryption key corresponds to the first key identifier. A first cryptographic function corresponding to the first cryptographic function identifier is determined. Applying the first cryptographic fun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/14
CPCH04L9/0822H04L9/14H04L2209/601H04L9/0816
Inventor D·B·彭塞莱昂
Owner INT BUSINESS MASCH CORP