首页 | 本学科首页   官方微博 | 高级检索  
     


Broadcast encryption schemes based on RSA
Authors:MU Ning-bo  HU Yu-pu  OU Hai-wen
Affiliation:[1]The Ministry of Education Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an 710071, China [2]Key Laboratory of Information Security and Secrecy, Beijing Institute of Electronic Science and Technology, Beijing 100070, China
Abstract:
Three broadcast schemes for small receiver set using the property of RSA modulus are presented. They can solve the problem of data redundancy when the size of receiver set is small. In the proposed schemes, the center uses one key to encrypt the message and can revoke authorization conveniently. Every authorized user only needs to store one decryption key of a constant size. Among these three schemes, the first one has indistinguishability against adaptive chosen ciphertext attack (IND-CCA2) secure, and any collusion of authorized users cannot produce a new decryption key but the sizes of encryption modulus and ciphertext are linear in the number of receivers. In the second scheme, the size of ciphertext is half of the first one and any two authorized users can produce a new decryption key, but the center can identify them using the traitor tracing algorithm. The third one is the most efficient but the center cannot identify the traitors exactly.
Keywords:broadcast encryption  traitor tracing  authorization revocation  RSA
本文献已被 维普 万方数据 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号