[go: up one dir, main page]

CN102394744B - Systems and methods for content distribution using broadcast encryption - Google Patents

Systems and methods for content distribution using broadcast encryption Download PDF

Info

Publication number
CN102394744B
CN102394744B CN201110355327.7A CN201110355327A CN102394744B CN 102394744 B CN102394744 B CN 102394744B CN 201110355327 A CN201110355327 A CN 201110355327A CN 102394744 B CN102394744 B CN 102394744B
Authority
CN
China
Prior art keywords
content
subscriber
trooping
reception client
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110355327.7A
Other languages
Chinese (zh)
Other versions
CN102394744A (en
Inventor
梁永斌
熊小康
屈耀荣
雷志斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hong Kong Applied Science and Technology Research Institute ASTRI
Original Assignee
Hong Kong Applied Science and Technology Research Institute ASTRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hong Kong Applied Science and Technology Research Institute ASTRI filed Critical Hong Kong Applied Science and Technology Research Institute ASTRI
Priority to CN201110355327.7A priority Critical patent/CN102394744B/en
Publication of CN102394744A publication Critical patent/CN102394744A/en
Application granted granted Critical
Publication of CN102394744B publication Critical patent/CN102394744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A system and method for content distribution using broadcast encryption, the method comprising: initially performing, by a server hosting a content distributor, a boot process that generates a public key and one or more private keys; performing, by a server hosting the content distributor, an encryption process to distribute one or more private keys, an initial password or a new password, and encrypted content to one or more content receiving clients in a distribution network; wherein the subscriber set is a subset of all content receiving clients in the distribution network and only those content receiving clients in the subscriber set can decrypt the encrypted content to the original content; wherein the subscriber set changes when one or more new subscribers join the subscriber set or one or more existing users within the subscriber set are removed from the subscriber set; and wherein the differential password generation method calculates a new password by reusing the saved calculation result of the original password calculation.

Description

使用广播加密进行内容分发的系统和方法Systems and methods for content distribution using broadcast encryption

技术领域 technical field

在此要求保护的发明总地涉及网络,特别涉及计算机网络或广播网络,例如电视。具体地,在此要求保护的发明涉及用于加密在网络中分发的特许内容的加密机制。The invention claimed herein relates to networks in general, and in particular to computer networks or broadcast networks, such as television. In particular, the invention claimed herein relates to encryption mechanisms for encrypting licensed content distributed in a network.

背景技术 Background technique

在广播加密机制中,内容分发商对于聆听广播频道或分发网络的用户或客户端加密其特许内容。任何用户或客户端可以使用其私有密钥来对接收到的加密的内容进行解密,但仅仅是选定子集的用户或客户端可以将加密的内容解密为原始内容。内容分发商可以控制和选择该子集。广播加密具有若干应用,包括加密的文件系统中的接入控制、电视订阅服务以及媒体内容保护。In broadcast encryption schemes, content distributors encrypt their licensed content for users or clients listening to a broadcast channel or distribution network. Any user or client can use its private key to decrypt received encrypted content, but only a selected subset of users or clients can decrypt encrypted content to the original content. Content distributors can control and select this subset. Broadcast encryption has several applications, including access control in encrypted file systems, television subscription services, and media content protection.

传统的广播加密机制,例如使用公共密钥基础结构(PKI)或双线性配对的那些广播加密机制,创建部分地基于订户集的密码头,该订户集是能够对加密的内容进行解密并且由此观看原始内容的内容接收客户端的子集。这些传统广播加密机制之一是Boneh-Gentry-Waters广播加密机制。Boneh-Gentry-Waters广播加密机制在以下报告中描述:Dan Boneh,CraigGentry,和Brent Waters,Collusion Resistant Broadcast Encryption With ShortCiphertexts and Private Keys,Crypto,2005,其公开的整体内容在此并入作为参考。在该广播加密机制中,当随着新的订户增加以及过期的订户移除而改变订户集时,要创建并分发新的密码头。在不重新使用任何原来的计算结果的情况下执行新的密码头的计算。此外,还在不重新使用任何原来的计算结果的情况下执行加密的内容的解密。由此,当订户集更新时密码头生成和加密内容的解密的计算量大且耗时,并且引起整体内容分发性能的恶化。现有的广播加密机制如2009年3月4日申请的美国专利申请No.12/397635中所公开的,其全部内容在此并入作为参考。Traditional broadcast encryption mechanisms, such as those using public key infrastructure (PKI) or bilinear pairing, create cryptographic headers based in part on the set of subscribers that are capable of decrypting the encrypted content and by This subset of content receiving clients views the original content. One of these traditional broadcast encryption mechanisms is the Boneh-Gentry-Waters broadcast encryption mechanism. The Boneh-Gentry-Waters broadcast encryption mechanism is described in Dan Boneh, Craig Gentry, and Brent Waters, Collusion Resistant Broadcast Encryption With ShortCiphertexts and Private Keys, Crypto, 2005, the entire disclosure of which is hereby incorporated by reference. In this broadcast encryption mechanism, new cryptographic headers are created and distributed when the set of subscribers is changed as new subscribers are added and expired subscribers are removed. The calculation of the new cryptographic header is performed without reusing any of the original calculation results. Furthermore, decryption of encrypted content is also performed without reusing any original calculation results. Thus, when the subscriber set is updated, the calculation amount of cipher header generation and decryption of encrypted content is large and time-consuming, and causes deterioration of overall content distribution performance. Existing broadcast encryption mechanisms are disclosed in US Patent Application No. 12/397635 filed March 4, 2009, the entire contents of which are hereby incorporated by reference.

传统广播加密机制的另一个缺点是该加密机制需要在系统的初始建立时在分发网络中内容接收客户端的总数是固定的,并且此后不能增加。Another disadvantage of the traditional broadcast encryption mechanism is that the encryption mechanism requires that the total number of content receiving clients in the distribution network be fixed at the initial establishment of the system, and cannot be increased thereafter.

由此,需要新的广播加密机制,当订户集改变时,该新的广播加密机制能够在密码头生成和加密的内容解密过程中更好地利用原来的计算结果,并且该新的广播加密机制足够强健以处理无限的总内容接收客户端总数。Therefore, a new broadcast encryption mechanism is required. When the subscriber set changes, the new broadcast encryption mechanism can better utilize the original calculation results in the process of cipher header generation and encrypted content decryption, and the new broadcast encryption mechanism Robust enough to handle an unlimited total number of total content receiving clients.

发明内容 Contents of the invention

在此要求保护的发明的目的在于提供一种使用具有优化的密码头生成和解密的广播加密机制进行内容分发的方法和系统。It is an object of the invention claimed herein to provide a method and system for content distribution using a broadcast encryption mechanism with optimized cipher header generation and decryption.

另一个目的在于当订户集改变时通过重新使用密码头生成和解密中的原来的计算结果实现优化。通过使用差分密码文本生成方法,该方法基于原来的密码文本值,可以减小用于生成密码头的计算量。对于解密处理,使用宽窗点加(wide window point addition)方法预先计算和保存加密机密的重建部分。由此,随后的加密机密重建可以依赖于预先计算的结果以加速计算时间。Another object is to achieve optimization by reusing original calculation results in cryptographic header generation and decryption when the set of subscribers changes. By using a differential cipher text generation method, which is based on the original cipher text value, the amount of computation used to generate the cipher header can be reduced. For the decryption process, the reconstructed part of the encrypted secret is precomputed and saved using a wide window point addition method. Thus, subsequent cryptographic secret reconstructions can rely on precomputed results to speed up computation time.

另一个目的是通过能够按照期望扩展的广播加密机制在内容分发中提供群集方案,以容纳无限数目的内容接收客户端。Another purpose is to provide a clustering scheme in content distribution through a broadcast encryption mechanism that can scale as desired to accommodate an unlimited number of content receiving clients.

附图说明 Description of drawings

下面参考附图更详细地描述本发明的实施例,其中:Embodiments of the invention are described in more detail below with reference to the accompanying drawings, in which:

图1示出了示意性说明使用广播加密的实例内容分发系统的框图。Figure 1 shows a block diagram schematically illustrating an example content distribution system using broadcast encryption.

具体实施方式 Detailed ways

在下文中,阐述了通过重新使用原来的密码头生成和加密计算结果的广播加密优化和通过使用集群的可缩放性的系统和方法作为优选的例子。对于本领域技术人员显而易见,在不背离本发明的精神和范围的情况下可以做出改变,包括增加和/或替换。可以省略特定细节以便不会遮掩本发明的特征;然而,公开内容被写成使本领域技术人员能在不进行过度试验的情况下实践这里的教导。In the following, a system and method for broadcast encryption optimization by reusing original cipher header generation and encryption calculation results and scalability by using clusters is described as a preferred example. It will be apparent to those skilled in the art that changes, including additions and/or substitutions, can be made without departing from the spirit and scope of the present invention. Certain details may be omitted so as not to obscure the characteristics of the present invention; however, the disclosure is written to enable one skilled in the art to practice the teachings herein without undue experimentation.

内容分发网络至少包括内容分发器和接收内容的一个或多个用户或客户端。广播加密主要是包括启动、加密和解密处理的多个处理的排序组合。A content distribution network includes at least a content distributor and one or more users or clients that receive content. Broadcast encryption is primarily a sequenced combination of multiple processes including initiation, encryption, and decryption processes.

根据一些传统广播加密机制,包括Boneh-Gentry-Waters广播加密机制,启动处理的主要输出是公共密钥和私有密钥。启动处理首先选择随机数发生器g∈G和随机数α∈Zp。其计算公共参数gi=g(αi)∈G,i=1,2,...,n,n+2,...,2n,其中n是在内容分发网络中的内容接收客户端的总数。然后选择随机数γ∈Zp并且设置v=gγ∈G。公共密钥被定义为:According to some traditional broadcast encryption mechanisms, including the Boneh-Gentry-Waters broadcast encryption mechanism, the main output of the boot process is the public key and the private key. The start-up process first selects a random number generator g∈G and a random number α∈Z p . It calculates the public parameter g i = g (αi) ∈ G, i = 1, 2, ..., n, n+2, ..., 2n, where n is the total number of content receiving clients in the content distribution network . Then choose a random number γ∈Zp and set v=g γ∈G . The public key is defined as:

PK=(g,g1,...,gn,gn+2,...,g2n,v)∈G2n+1 PK=(g, g 1 , . . . , g n , g n+2 , . . . , g 2n , v)∈G 2n+1

私有密钥被定义为:The private key is defined as:

di=gi γ∈G,i∈{1,...,n},其中i表示在内容分发网络中的某个内容接收客户端。d i = g i γ ∈ G, i ∈ {1, . . . , n}, where i represents a certain content receiving client in the content delivery network.

私有密钥di,...,dn要被分发给内容接收客户端。每个内容接收客户端要接收并保存要在随后的解密处理中使用的一个私有密钥。The private keys d i , . . . , d n are to be distributed to content receiving clients. Each content receiving client receives and stores a private key to be used in the subsequent decryption process.

加密处理采用生成的公共密钥PK和订户集S来生成用于加密要被分发的原始内容的加密机密和密码文本,该密码作为密码头的一部分,用于与加密内容一起分发给内容接收客户端。加密处理首先选择随机数t∈Zp。加密机密被定义为:The encryption process employs the generated public key PK and the subscriber set S to generate an encrypted secret and ciphertext for encrypting the original content to be distributed as part of the cipher header for distribution with the encrypted content to content receiving customers end. The encryption process first selects a random number t∈Z p . An encrypted secret is defined as:

K=e(gn+1,g)t K=e(g n+1 , g) t

密码文本被定义为:The cipher text is defined as:

Hdr=(gt,(v∏j∈S gn+1-j)t)∈G2 Hdr=(g t ,(v∏ j∈S g n+1-j ) t )∈G 2

=(C0,C1)=(C 0 ,C 1 )

解密处理由分发网络中的每个内容接收客户端执行。在电视广播网络中,内容接收客户端通常是接收机机顶盒。当内容接收客户端i接收密码头(其包括密码)和加密的内容时,解密处理采取其原来接收并保存的客户端私有密钥di,以及密码文本Hdr来重构加密机密K用于解密加密的内容。加密机密K可以如下计算:Decryption processing is performed by each content receiving client in the distribution network. In a television broadcast network, the content receiving client is usually a receiver set-top box. When the content receiving client i receives the cryptographic header (which includes the password) and the encrypted content, the decryption process adopts the client private key d i received and stored originally, and the ciphertext Hdr to reconstruct the encrypted secret K for decryption encrypted content. The encryption secret K can be computed as follows:

K=e(gi,C1)/e(dij∈S,j≠ign+1-j+i,C0)K=e(g i , C 1 )/e(d ij∈S, j≠i g n+1-j+i , C 0 )

通过从私有密钥di和密码文本Hdr重建的加密机密K,使用加密机密K解密被加密的内容。结果是解密的内容等于原始内容。因为当加密原始内容时加密处理考虑了订户集S,仅订户集S内有效的订户可以成功地解密被加密的内容。The encrypted content is decrypted using the encryption secret K by reconstructing the encryption secret K from the private key d i and the ciphertext Hdr. The result is that the decrypted content is equal to the original content. Because the encryption process takes into account the subscriber set S when encrypting the original content, only subscribers valid within the subscriber set S can successfully decrypt the encrypted content.

图1示出了示意性说明使用广播加密的实例内容分发系统的框图。根据图1,内容接收客户端120接收有全局公开值并按照如下方式运行。Figure 1 shows a block diagram schematically illustrating an example content distribution system using broadcast encryption. According to FIG. 1 , the content receiving client 120 receives the global public value and operates as follows.

步骤1,内容接收客户端120,即图中所示机顶盒向认证服务器发送认证请求;Step 1, the content receiving client 120, that is, the set-top box shown in the figure, sends an authentication request to the authentication server;

步骤2,认证服务器向群集管理服务器发送授权确认请求,群集管理服务器接收该请求后从其对应的授权服务器的实例进行查找,并将查找得到的授权确认发送回认证服务器;Step 2, the authentication server sends an authorization confirmation request to the cluster management server, and after receiving the request, the cluster management server searches from its corresponding instance of the authorization server, and sends the authorization confirmation obtained after the search back to the authentication server;

步骤3,认证服务器向群集管理服务器发送内容指定的私有密钥的请求,群集管理服务器接收该请求后根据群集方案130从其对应的密钥服务器的实例进行查找,并将查找得到的内容指定的私有密钥发送回认证服务器;Step 3: The authentication server sends a request for the specified private key to the cluster management server. After receiving the request, the cluster management server searches from the instance of the corresponding key server according to the cluster scheme 130, and specifies the private key obtained by the search. The private key is sent back to the authentication server;

步骤4,认证服务器将内容指定的私有密钥发送回内容接收客户端120;Step 4, the authentication server sends the private key specified by the content back to the content receiving client 120;

步骤5,将内容接收客户端120放入内容指定的分发网络,其中加密服务器110将清楚的内容加密为具有内容指定的公开值的加密后的内容,并将该加密的内容和当前订户集发送给分发网络,而后内容接收客户端120收到该加密的内容和当前订户集;Step 5, put the content receiving client 120 into the distribution network specified by the content, wherein the encryption server 110 encrypts the clear content into encrypted content with the public value specified by the content, and sends the encrypted content and the current subscriber set to the distribution network, and then the content receiving client 120 receives the encrypted content and the current subscriber set;

步骤6,内容接收客户端120根据全局公开值使用内容指定的私有密钥解密加密后的内容,得到清楚的内容。In step 6, the content receiving client 120 decrypts the encrypted content according to the global public value using the private key specified by the content to obtain clear content.

参考图1,根据当前要求保护的发明的各种实施例,通过在内容分发器中驻留的加密服务器110执行加密处理。加密服务器110可以由一个或多个计算机服务器执行。当订户集改变时,密码文本Hdr需要被重新计算。根据当前要求保护的发明的实施例,通过差分密码文本生成方法从原来的密码文本Hdr计算新的密码文本Hdr’,下面列出了计算步骤:Referring to FIG. 1, according to various embodiments of the presently claimed invention, encryption processing is performed by an encryption server 110 residing in a content distributor. Encryption server 110 may be implemented by one or more computer servers. When the set of subscribers changes, the cipher text Hdr needs to be recalculated. According to an embodiment of the presently claimed invention, a new ciphertext Hdr' is calculated from an original ciphertext Hdr by a differential ciphertext generation method, the calculation steps are listed below:

1.当首先生成密码文本Hdr时,保留变体pHdr,其中1. When the ciphertext Hdr is first generated, the variant pHdr is retained, where

pHdr=(g,H)=(g,(v∏j∈Sgn+1-j))pHdr=(g, H)=(g, (v∏ j∈S g n+1-j ))

2.当改变订户集S时,从pHdr计算新的变体pHdr’=(g,H’)2. When changing the subscriber set S, calculate the new variant pHdr' = (g, H') from pHdr

a.当新的内容接收客户端集S+被加入到S,则H’=H∏j∈S +gn+1-j a. When a new content receiving client set S + is added to S, then H'=H∏ j∈S + g n+1-j

b.当从S移除现有的内容接收客户端集S-,则H’=H/∏j∈S -gn+1-j b. When the existing content receiving client set S - is removed from S, then H'=H/∏ j∈S - g n+1-j

3.从pHdr’计算Hdr’:3. Calculate Hdr' from pHdr':

a.生成新的随机数t’∈Zp a. Generate a new random number t'∈Z p

b.计算Hdr’=(gt’,(H’)t’)b. Calculate Hdr'=(g t ', (H') t ')

仍然参考图1,根据当前要求保护的方面的各种实施例,由在分发网络中的每个内容接收客户端120执行解密处理。在电视广播网络中,内容接收客户端120通常是接收机机顶盒,包括用于执行解密处理的电子电路和处理器。解密处理首先包括重构加密机密K,用于根据以下公式解密接收到的加密内容:Still referring to FIG. 1 , according to various embodiments of the presently claimed aspects, the decryption process is performed by each content receiving client 120 in the distribution network. In a television broadcast network, the content receiving client 120 is typically a receiver set-top box, including electronic circuitry and a processor for performing the decryption process. The decryption process first consists of reconstructing the encrypted secret K for decrypting the received encrypted content according to the following formula:

K=e(gi,C1)/e(dij∈S,j≠ign+1-j+1,C0)K=e(g i , C 1 )/e(d ij∈S, j≠i g n+1-j+1 , C 0 )

这个计算涉及两个双线性配对、一个除法和m+1个点加,其中m是订户集S中订户的数目。根据当前要求保护的发明的实施例,可以通过使用宽窗点加方法加速解密过程。该宽窗点加方法通过预先计算并保存公共参数{g,g1,...,gn,gn+2,...,g2n}的多个预先计算的结果可以加速∏j∈s,j≠ign+1-j+i的计算。宽窗点加方法包括以下步骤:This computation involves two bilinear pairings, a division and m+1 point additions, where m is the number of subscribers in the subscriber set S. According to an embodiment of the presently claimed invention, the decryption process can be accelerated by using a wide window point addition method. The wide-window point addition method can speed up j∈ Calculation of s, j≠i g n+1-j+i . The wide window point addition method includes the following steps:

1.选择宽窗宽度k1. Choose wide window width k

2.将公共参数组{g,g1,...,gn,gn+2,...,g2n}重新命名为{r1,...,rn,rn+2,...,r2n}2. Rename the public parameter group {g, g1 , ..., gn , gn+2 , ..., g2n } to { r1 , ..., rn , rn +2 , ..., r2n }

3.将组{r1,...,rn,rn+2,...,r2n}划分为[2n/k]个子组,使得:3. Divide the group {r 1 , ..., r n , r n+2 , ..., r 2n } into [2n/k] subgroups such that:

R1={r1,...,rk}R 1 ={r 1 ,...,r k }

R2={rk+1,...,r2k}R 2 ={r k+1 ,...,r 2k }

R[2n/k]={r([2n/k]-1)k+1,...,r2n}R [2n/k] = {r ([2n/k]-1)k+1 ,...,r 2n }

4.计算并保存{P1,P2,...,P[2n/k]},其中:4. Compute and save {P 1 , P 2 , ..., P [2n/k] }, where:

Figure BDA0000107183080000061
Figure BDA0000107183080000061

对于宽窗点加方法的示例性证明,其中使用了两个宽窗宽度:An exemplary demonstration for the wide-window point addition method, where two wide window widths are used:

k=2k=2

R1={r1,r2}→P1={r1,r2,r1+r2}R 1 ={r 1 , r 2 }→P 1 ={r 1 ,r 2 ,r 1 +r 2 }

对于宽窗点加方法的另一个示例性证明,其中使用了四个宽窗宽度:Another exemplary demonstration for the wide-window point-add method, where four wide window widths are used:

k=4k=4

R1={r1,r2,r3,r4}→R 1 = {r 1 , r 2 , r 3 , r 4 }→

P1={r1,r2,r3,r4P 1 = {r 1 , r 2 , r 3 , r 4 ,

r1+r2,r1+r3,r1+r4r 1 +r 2 , r 1 +r 3 , r 1 +r 4 ,

r2+r3,r2+r4,r3+r4r 2 +r 3 , r 2 +r 4 , r 3 +r 4 ,

r1+r2+r3,r1+r2+r4r 1 +r 2 +r 3 , r 1 +r 2 +r 4 ,

r1+r3+r4,r2+r3+r4r 1 +r 3 +r 4 , r 2 +r 3 +r 4 ,

r1+r2+r3+r4}r 1 +r 2 +r 3 +r 4 }

为了计算∏j∈S,j≠ign+1-j+i用于重建加密机密K,首先设置S’={gn+1-j+i|j∈S,j≠i},然后确定所有的组Ui={Ri∩S’}。并且对于所有

Figure BDA0000107183080000071
确定在预先计算的值Pi中的所有元素Ui的积。最后∏j∈S,j≠ign+1-j+l=∏i=1 [2n/k]uj,uj∈Ui,其中
Figure BDA0000107183080000072
因为Pi可以被预先计算并保存,所以减少了用于随后重建加密机密K的时间,增加了解密处理的性能。To compute ∏ j∈S,j≠i g n+1-j+i for reconstructing the encrypted secret K, first set S'={g n+1-j+i |j∈S,j≠i}, then All sets U i ={R i ∩S'} are determined. and for all
Figure BDA0000107183080000071
Determine the product of all elements U i in the precomputed values Pi. Finally ∏ j∈S, j≠i g n+1-j+l =∏ i=1 [2n/k] u j , u j ∈ U i , where
Figure BDA0000107183080000072
Since Pi can be pre-computed and saved, the time for subsequent reconstruction of the encrypted secret K is reduced, increasing the performance of the decryption process.

仍然参考图1,除了生成公共密钥PK和私有密钥di,...,dn之外,启动处理通常包括认证和授权内容接收客户端并且确定他们接入某些内容的授权或订阅的操作。由此确定订户集S。因为在初始启动处理中生成的私有密钥的数目由总内容接收客户端总数的数目n固定,此后不能增加该客户端总数。Still referring to FIG. 1 , in addition to generating public keys PK and private keys di ,..., dn , the initiation process typically includes authenticating and authorizing content receiving clients and determining their authorization or subscription to access certain content operation. From this the set S of subscribers is determined. Since the number of private keys generated in the initial startup process is fixed by the number n of the total content receiving client population, the client population cannot be increased thereafter.

根据当前要求保护的发明的各种实施例,通过使用群集方案130可以消除该限制,在群集方案中内容接收客户端被划分为不同的群集。该划分可以是基于内容接收客户端的地理位置。群集方案130包括用于公共和私有密钥生成的密钥服务器、用于存储和提供内容接收客户端的授权信息的授权服务器以及群集管理服务器的多个实例。群集管理服务器包含每个内容接收客户端的信息、内容接收客户端所属的密钥服务器和授权服务器的实例的信息。通过利用密钥服务器的多个实例,内容分发系统具有公开密钥和私有密钥的多个集合。每个内容接收客户端从其对应的密钥服务器的实例接收私有密钥。According to various embodiments of the presently claimed invention, this limitation may be eliminated by using a clustering scheme 130 in which content receiving clients are divided into different clusters. The division may be based on the geographic location of the content receiving client. The cluster scheme 130 includes a key server for public and private key generation, an authorization server for storing and providing authorization information for content receiving clients, and multiple instances of a cluster management server. The cluster management server contains information of each content receiving client, the key server and the instance of the authorization server to which the content receiving client belongs. By utilizing multiple instances of key servers, the content distribution system has multiple sets of public and private keys. Each content receiving client receives the private key from its corresponding instance of the key server.

使用群集方案,对于每个实例分别生成公开参数和订户集。修改加密处理以生成对应于实例的加密内容和密码头的多个集合,并且根据内容接收客户端所属的他们的实例来分发给内容接收客户端。Using the clustering scheme, the public parameters and subscriber sets are generated separately for each instance. The encryption process is modified to generate multiple sets of encrypted content and cryptographic headers corresponding to instances and distributed to content receiving clients according to their instance to which they belong.

随后可以将密钥服务器和授权服务器的新的实例加入到内容分发系统,由此扩展其容量。根据要求保护的发明的实施例,群集管理服务器提供用户管理界面,用于配置内容接收客户端与密钥服务器和授权服务器的实例之间的映射信息。New instances of key servers and authorization servers can then be added to the content distribution system, thereby expanding its capacity. According to an embodiment of the claimed invention, the cluster management server provides a user management interface for configuring mapping information between content receiving clients and instances of key servers and authorization servers.

可以利用通用或者专用计算设备、计算机处理器、或者电子电路实现本文公开的实施例,所述电子电路包括但不限于数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)和根据本发明所教导的配置或者编程的其他可编程逻辑设备。运行在通用或者专用计算设备、计算机处理器或者可编程逻辑设备上的计算机指令或软件代码可以由软件或电子领域技术人员根据本发明的教导容易地准备。Embodiments disclosed herein may be implemented using general or special purpose computing devices, computer processors, or electronic circuitry including, but not limited to, digital signal processors (DSPs), application specific integrated circuits (ASICs), field programmable gate arrays (FPGA) and other programmable logic devices configured or programmed according to the teachings of the present invention. Computer instructions or software codes to run on a general or special purpose computing device, computer processor or programmable logic device can be readily prepared by one skilled in the software or electronics arts from the teachings of the present invention.

在一些实施方式中,本发明包括计算机存储媒介,该计算机存储媒介在其中存储有计算机指令或软件代码,该计算机指令或软件代码可以用来为计算机或微处理器编程以执行本发明的任何程序。存储媒介可以包括但不限于软盘、光盘、蓝光盘、DVD、CD-ROM和磁光盘、ROM、RAM、闪存或者适于存储指令、代码和/或数据的任何类型的媒介或设备。In some embodiments, the present invention includes computer storage media having stored therein computer instructions or software code that can be used to program a computer or microprocessor to perform any of the procedures of the present invention . Storage media may include, but is not limited to, floppy disks, optical disks, Blu-ray disks, DVD, CD-ROM and magneto-optical disks, ROM, RAM, flash memory, or any type of medium or device suitable for storing instructions, code and/or data.

出于展示和描述的目的,提供了本发明的前述描述。其并不旨在排除或者将本发明限制在所公开的精密形式。对于所属领域技术人员而言,很多修改和变型是显而易见的。The foregoing description of the invention has been presented for purposes of illustration and description. It is not intended to exclude or limit the invention to the precise forms disclosed. Many modifications and variations will be apparent to those skilled in the art.

为了更好地解释本发明的原理及其实际应用,选择和描述了那些实施方式,从而使得所属领域技术人员能够理解本发明的各个实施方式和适于预想的实际应用的各种修改。本发明的范围由所附权利要求及其等效物限定。Those embodiments were chosen and described in order to better explain the principles of the invention and its practical application, thereby enabling those skilled in the art to understand the invention for various embodiments and with various modifications as are suited to the practical application contemplated. The scope of the invention is defined by the appended claims and their equivalents.

Claims (7)

1. a content distribution method that uses broadcast enciphering, comprising:
By the server of supervisor's content distributor, initially carry out one-shot and process, described startup is processed and is produced public-key cryptography and one or more private cipher key;
Server by supervisor's content distributor performs encryption processing, and described encryption comprises:
Use public-key cryptography and subscriber's collection initially to calculate initial password text one time;
When subscriber collects change, calculate new cryptogram, the calculating of described new cryptogram is based on difference cryptogram generation method;
Generate encrypted confidential;
Use encrypted confidential that original contents is encrypted to the content after encryption;
Contents distribution by one or more private cipher keys, initial password text or new cryptogram and after encrypting is to the one or more content reception clients in distributing network;
Each content reception client in distributing network is carried out decryption processing to the content after encrypting, and described decryption processing is based on wide window point adding method;
Wherein subscriber's collection is the subset that in distributing network, all the elements receive client, and only the concentrated content reception client of subscriber can be original contents by the contents decryption after encrypting;
Wherein when one or more new subscribers add subscriber to collect or subscriber collection in one or more existing subscriber while removing from subscriber's collection, subscriber collects change;
Wherein difference cryptogram generation method is calculated new cryptogram by reusing the result of calculation of the preservation of original cryptogram calculating; And
Wherein wide window point adding method is reused the result of calculation in advance of the preservation that the grouping point of open parameter adds in the reconstruction of encrypted confidential.
2. method according to claim 1, also comprises:
By content reception client logic be divided into a plurality of trooping;
The authorization message of each content reception client is provided from the Multi-instance of authorization server, and the example of authorization server is corresponding to trooping;
From the Multi-instance of key server, provide a plurality of public-key cryptography and a plurality of private cipher key, the example of key server is corresponding to trooping;
From with content reception client under the example of the corresponding key server of trooping private cipher key is distributed to content reception client;
Calculate a plurality of set of initial password text and new cryptogram, each troop a public-key cryptography of gathering and trooping based on this and subscriber's collection;
Generate a plurality of encrypted confidentials, each encrypted confidential of trooping, and the corresponding cryptogram that uses this to troop;
Original contents is encrypted to the content after a plurality of encryptions, each content after an encryption of trooping, and the corresponding encrypted confidential that uses this to troop; And
According to the contents distribution of trooping by initial password text or new cryptogram and after encrypting under content reception client to described content reception client.
3. method according to claim 2, wherein by content reception client logic to be divided into a plurality of trooping be the geographical position of content-based reception client.
4. a content distribution method that uses broadcast enciphering, comprising:
By the server of supervisor's content distributor, initially carry out one-shot and process, described startup is processed and is produced public-key cryptography and one or more private cipher key;
Server by supervisor's content distributor performs encryption processing, and described encryption comprises:
Use public-key cryptography and subscriber's collection initially to calculate initial password text one time;
When collecting change, subscriber calculates new cryptogram;
Generate encrypted confidential;
Use encrypted confidential that original contents is encrypted to the content after encryption;
Contents distribution by one or more private cipher keys, initial password text or new cryptogram and after encrypting is to the content reception client in distributing network;
Each content reception client in distributing network is carried out decryption processing to the content after encrypting, and described decryption processing is based on wide window point adding method;
Wherein subscriber's collection is the subset that in distributing network, all the elements receive client, and those content reception clients that only subscriber concentrates can be original contents by the contents decryption after encrypting;
Wherein when one or more new subscribers add subscriber to collect or subscriber collection in one or more existing subscriber while removing from subscriber's collection, subscriber collects change; And
Wherein wide window point adding method is reused the result of calculation in advance of the preservation that the grouping point of open parameter adds in the reconstruction of encrypted confidential.
5. method according to claim 4, wherein wide window point adding method also provides configurable wide window width, the group size adding for controlling the grouping point of open parameter.
6. method according to claim 4, also comprises:
By content reception client logic be divided into a plurality of trooping;
The authorization message of each content reception client is provided from the Multi-instance of authorization server, and the example of authorization server is corresponding to trooping;
From the Multi-instance of key server, provide a plurality of public-key cryptography and a plurality of private cipher key, the example of key server is corresponding to trooping;
From with content reception client under the example of the corresponding key server of trooping private cipher key is distributed to content reception client;
A plurality of set of calculating initial password text and new cryptogram, each is trooped one and gathers, and the public-key cryptography of trooping based on this and subscriber's collection;
Generate a plurality of encrypted confidentials, each encrypted confidential of trooping, and the corresponding cryptogram that uses this to troop;
Original contents is encrypted to the content after a plurality of encryptions, each content after an encryption of trooping, and the corresponding encrypted confidential that uses this to troop; And
According to the contents distribution of trooping by initial password text or new cryptogram and after encrypting under content reception client to described content reception client.
7. method according to claim 6, wherein by content reception client logic to be divided into a plurality of trooping be the geographical position of content-based reception client.
CN201110355327.7A 2011-11-10 2011-11-10 Systems and methods for content distribution using broadcast encryption Active CN102394744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110355327.7A CN102394744B (en) 2011-11-10 2011-11-10 Systems and methods for content distribution using broadcast encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110355327.7A CN102394744B (en) 2011-11-10 2011-11-10 Systems and methods for content distribution using broadcast encryption

Publications (2)

Publication Number Publication Date
CN102394744A CN102394744A (en) 2012-03-28
CN102394744B true CN102394744B (en) 2014-04-16

Family

ID=45861953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110355327.7A Active CN102394744B (en) 2011-11-10 2011-11-10 Systems and methods for content distribution using broadcast encryption

Country Status (1)

Country Link
CN (1) CN102394744B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102694819B (en) * 2012-06-13 2015-07-22 苏州大学 Streaming media transmission method based on broadcast encryption
US9516000B2 (en) * 2015-03-27 2016-12-06 International Business Machines Corporation Runtime instantiation of broadcast encryption schemes

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001186119A (en) * 1999-12-22 2001-07-06 Nippon Telegr & Teleph Corp <Ntt> Key management method and key management device using tree structure and recording medium
CN101044754A (en) * 2004-11-12 2007-09-26 三星电子株式会社 Method of managing user key for broadcast encryption
CN101150394A (en) * 2006-09-22 2008-03-26 中国科学院声学研究所 A Client Extension Method of Subset Differential/Hierarchical Subset Differential Mechanism
CN101150395A (en) * 2006-09-22 2008-03-26 中国科学院声学研究所 A Four-layer Encryption Method for Encrypting Double Packets of Authorization Management System

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7450722B2 (en) * 2002-12-13 2008-11-11 General Instrument Corporation Subset difference method for multi-cast rekeying
US7477738B2 (en) * 2005-12-21 2009-01-13 General Instrument Corporation Data sequence encryption and decryption
KR100929226B1 (en) * 2007-08-22 2009-12-01 한국과학기술원 Key Management Method in User Group for Broadcast Encryption
US8468341B2 (en) * 2009-03-04 2013-06-18 Hong Kong Applied Science and Technology Research Institute Company Limited System and method for content distribution with broadcast encryption
EP2355503A1 (en) * 2010-02-04 2011-08-10 Nagravision S.A. Method to manage members of at least one group of decoders having access to audio/video data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001186119A (en) * 1999-12-22 2001-07-06 Nippon Telegr & Teleph Corp <Ntt> Key management method and key management device using tree structure and recording medium
CN101044754A (en) * 2004-11-12 2007-09-26 三星电子株式会社 Method of managing user key for broadcast encryption
CN101150394A (en) * 2006-09-22 2008-03-26 中国科学院声学研究所 A Client Extension Method of Subset Differential/Hierarchical Subset Differential Mechanism
CN101150395A (en) * 2006-09-22 2008-03-26 中国科学院声学研究所 A Four-layer Encryption Method for Encrypting Double Packets of Authorization Management System

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
《Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys》;Dan Boneh,Craig Gentry,Brent Waters;《Crypto 2005 LNCS 3621》;20051231;258-260 *
《Revocation and Tracing Schemes for Stateless Receivers》;D. Naor, M. Naor, and J. Lotspiech;《Crypto 2001》;20011231;41–62 *
《基于对的群体密码学研究》;秦波;《中国博士学位论文全文数据库 信息科技辑》;20090115(第 1 期);I136-8 *
《基于广播加密的叛逆者追踪研究》;张学军;《中国博士学位论文全文数据库 信息科技辑》;20080415(第 4 期);I138-2 *
D. Naor, M. Naor, and J. Lotspiech.《Revocation and Tracing Schemes for Stateless Receivers》.《Crypto 2001》.2001,41–62.
Dan Boneh,Craig Gentry,Brent Waters.《Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys》.《Crypto 2005 LNCS 3621》.2005,258-275.
张学军.《基于广播加密的叛逆者追踪研究》.《中国博士学位论文全文数据库 信息科技辑》.2008,(第 4 期),I138-2.
秦波.《基于对的群体密码学研究》.《中国博士学位论文全文数据库 信息科技辑》.2009,(第 1 期),I136-8.

Also Published As

Publication number Publication date
CN102394744A (en) 2012-03-28

Similar Documents

Publication Publication Date Title
Liu et al. Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication
US8468341B2 (en) System and method for content distribution with broadcast encryption
CN105049207B (en) A kind of broadcast encryption scheme with customized information of identity-based
JP2014535199A (en) Secure distribution of content
Ming et al. Efficient revocable multi-authority attribute-based encryption for cloud storage
Vijayakumar et al. An effective key distribution for secure internet pay‐TV using access key hierarchies
CN109543439A (en) A kind of service request method and device of car networking
Udendhran A hybrid approach to enhance data security in cloud storage
Kaaniche et al. Cloudasec: A novel public-key based framework to handle data sharing security in clouds
US8483390B2 (en) Systems and methods for broadcast encryption optimization and scalability
Bellafqira et al. Proxy re-encryption based on homomorphic encryption
Pal et al. Efficient and secure key management for conditional access systems
CN114900283B (en) Deep learning user gradient aggregation method based on multiparty security calculation
CN102394744B (en) Systems and methods for content distribution using broadcast encryption
Hong et al. A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud
CN113312647A (en) Multi-agent data sharing method based on block chain storage
CN111541669A (en) A broadcast encryption method and system
Fu et al. Secure multi-receiver communications: Models, proofs, and implementation
JP5457979B2 (en) Conditional reception system, message distribution device, message reception device, message distribution program, and message reception program
CN111371760B (en) Broadcast encryption method and system based on certificate
Mishra et al. A certificateless authenticated key agreement protocol for digital rights management system
CN111510295A (en) A certificate-based anonymous broadcast encryption method and system that can transmit personal messages
CN102324994B (en) Systems and methods for broadcast encryption optimization and scalability
Michael Security and Privacy issues of IoT at Fog layer architecture
CN115361114B (en) Fuzzy identification-based encryption system and method based on SM9 supporting large attributes

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant