Font Size: a A A

The Research And Implementation Of Stateless Broadcast Encryption Scheme Based On Public Key Cryptography

Posted on:2007-08-31Degree:MasterType:Thesis
Country:ChinaCandidate:Z Z ChenFull Text:PDF
GTID:2178360212477476Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the success of the Internet, Multimedia applications and compression technology make great improvements. The security issue of Multimedia becomes more and more important. The digital rights management (DRM) is a good framework to solve the security problem and protect the copyright of multimedia.The stateless Broadcast Encryption scheme can be directly designed to build a DRM system.Most of the Broadcast Encryption schemes for stateless receivers are designed to work in symmetric key setting. Key Distribution Center, Message Distribution Center and Client User all have to keep the same symmetric keys, which leads to the problem of key compromise. Building a public key broadcast encryption scheme is a good solution to this problem. However, the common public key schemes are fit only for Complete Subtree method in Broadcast Encryption. The more elegant SD/LSD methods using public key scheme will result in an enormous public key and very large storage for every user. The Hierarchical Identity-Based Encryption can reduce the public size and user's storage when it is used in SD/LSD methods.Based on the stateless broadcast encryption scheme with Complete-Subtree method using the X509 certificate, this paper discusses the design of a secure Multimedia system and implements a scalable, flexible and more robust DRM system for Multimedia.And we designed an ID-based broadcast encryption scheme using the latest HIBE algorithm based Weil Pairings and the complete subtree method under the subset cover framework. In this scheme, user's ID is used as public key for encryption. So the Public Key/Certificates Distribution System is not necessary. And the number of private keys which users have to keep can be reduced from O(logN) to O(1), because of the key hierarchical generation in HIBE algorithm. Finally the cryptanalysis and the discussion of efficiency and dynamic extensibility are given as well.And We bring the latest and efficient HIBE scheme, which has the constant size cipher text, to SD method and demonstrate the modified HIBE scheme which makes...
Keywords/Search Tags:broadcast encryption, subset-cover, complete subtree, subset difference, hierarchical identity-based encryption, digital rights management
PDF Full Text Request
Related items