CN102394744B - Systems and methods for content distribution using broadcast encryption - Google Patents
Systems and methods for content distribution using broadcast encryption Download PDFInfo
- Publication number
- CN102394744B CN102394744B CN201110355327.7A CN201110355327A CN102394744B CN 102394744 B CN102394744 B CN 102394744B CN 201110355327 A CN201110355327 A CN 201110355327A CN 102394744 B CN102394744 B CN 102394744B
- Authority
- CN
- China
- Prior art keywords
- content
- subscriber
- trooping
- reception client
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 238000013475 authorization Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 8
- 238000004321 preservation Methods 0.000 claims 3
- 239000012141 concentrate Substances 0.000 claims 1
- 230000007246 mechanism Effects 0.000 description 16
- 238000007726 management method Methods 0.000 description 8
- 238000007792 addition Methods 0.000 description 7
- 239000003643 water by type Substances 0.000 description 4
- 238000012790 confirmation Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000006866 deterioration Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
技术领域 technical field
在此要求保护的发明总地涉及网络,特别涉及计算机网络或广播网络,例如电视。具体地,在此要求保护的发明涉及用于加密在网络中分发的特许内容的加密机制。The invention claimed herein relates to networks in general, and in particular to computer networks or broadcast networks, such as television. In particular, the invention claimed herein relates to encryption mechanisms for encrypting licensed content distributed in a network.
背景技术 Background technique
在广播加密机制中,内容分发商对于聆听广播频道或分发网络的用户或客户端加密其特许内容。任何用户或客户端可以使用其私有密钥来对接收到的加密的内容进行解密,但仅仅是选定子集的用户或客户端可以将加密的内容解密为原始内容。内容分发商可以控制和选择该子集。广播加密具有若干应用,包括加密的文件系统中的接入控制、电视订阅服务以及媒体内容保护。In broadcast encryption schemes, content distributors encrypt their licensed content for users or clients listening to a broadcast channel or distribution network. Any user or client can use its private key to decrypt received encrypted content, but only a selected subset of users or clients can decrypt encrypted content to the original content. Content distributors can control and select this subset. Broadcast encryption has several applications, including access control in encrypted file systems, television subscription services, and media content protection.
传统的广播加密机制,例如使用公共密钥基础结构(PKI)或双线性配对的那些广播加密机制,创建部分地基于订户集的密码头,该订户集是能够对加密的内容进行解密并且由此观看原始内容的内容接收客户端的子集。这些传统广播加密机制之一是Boneh-Gentry-Waters广播加密机制。Boneh-Gentry-Waters广播加密机制在以下报告中描述:Dan Boneh,CraigGentry,和Brent Waters,Collusion Resistant Broadcast Encryption With ShortCiphertexts and Private Keys,Crypto,2005,其公开的整体内容在此并入作为参考。在该广播加密机制中,当随着新的订户增加以及过期的订户移除而改变订户集时,要创建并分发新的密码头。在不重新使用任何原来的计算结果的情况下执行新的密码头的计算。此外,还在不重新使用任何原来的计算结果的情况下执行加密的内容的解密。由此,当订户集更新时密码头生成和加密内容的解密的计算量大且耗时,并且引起整体内容分发性能的恶化。现有的广播加密机制如2009年3月4日申请的美国专利申请No.12/397635中所公开的,其全部内容在此并入作为参考。Traditional broadcast encryption mechanisms, such as those using public key infrastructure (PKI) or bilinear pairing, create cryptographic headers based in part on the set of subscribers that are capable of decrypting the encrypted content and by This subset of content receiving clients views the original content. One of these traditional broadcast encryption mechanisms is the Boneh-Gentry-Waters broadcast encryption mechanism. The Boneh-Gentry-Waters broadcast encryption mechanism is described in Dan Boneh, Craig Gentry, and Brent Waters, Collusion Resistant Broadcast Encryption With ShortCiphertexts and Private Keys, Crypto, 2005, the entire disclosure of which is hereby incorporated by reference. In this broadcast encryption mechanism, new cryptographic headers are created and distributed when the set of subscribers is changed as new subscribers are added and expired subscribers are removed. The calculation of the new cryptographic header is performed without reusing any of the original calculation results. Furthermore, decryption of encrypted content is also performed without reusing any original calculation results. Thus, when the subscriber set is updated, the calculation amount of cipher header generation and decryption of encrypted content is large and time-consuming, and causes deterioration of overall content distribution performance. Existing broadcast encryption mechanisms are disclosed in US Patent Application No. 12/397635 filed March 4, 2009, the entire contents of which are hereby incorporated by reference.
传统广播加密机制的另一个缺点是该加密机制需要在系统的初始建立时在分发网络中内容接收客户端的总数是固定的,并且此后不能增加。Another disadvantage of the traditional broadcast encryption mechanism is that the encryption mechanism requires that the total number of content receiving clients in the distribution network be fixed at the initial establishment of the system, and cannot be increased thereafter.
由此,需要新的广播加密机制,当订户集改变时,该新的广播加密机制能够在密码头生成和加密的内容解密过程中更好地利用原来的计算结果,并且该新的广播加密机制足够强健以处理无限的总内容接收客户端总数。Therefore, a new broadcast encryption mechanism is required. When the subscriber set changes, the new broadcast encryption mechanism can better utilize the original calculation results in the process of cipher header generation and encrypted content decryption, and the new broadcast encryption mechanism Robust enough to handle an unlimited total number of total content receiving clients.
发明内容 Contents of the invention
在此要求保护的发明的目的在于提供一种使用具有优化的密码头生成和解密的广播加密机制进行内容分发的方法和系统。It is an object of the invention claimed herein to provide a method and system for content distribution using a broadcast encryption mechanism with optimized cipher header generation and decryption.
另一个目的在于当订户集改变时通过重新使用密码头生成和解密中的原来的计算结果实现优化。通过使用差分密码文本生成方法,该方法基于原来的密码文本值,可以减小用于生成密码头的计算量。对于解密处理,使用宽窗点加(wide window point addition)方法预先计算和保存加密机密的重建部分。由此,随后的加密机密重建可以依赖于预先计算的结果以加速计算时间。Another object is to achieve optimization by reusing original calculation results in cryptographic header generation and decryption when the set of subscribers changes. By using a differential cipher text generation method, which is based on the original cipher text value, the amount of computation used to generate the cipher header can be reduced. For the decryption process, the reconstructed part of the encrypted secret is precomputed and saved using a wide window point addition method. Thus, subsequent cryptographic secret reconstructions can rely on precomputed results to speed up computation time.
另一个目的是通过能够按照期望扩展的广播加密机制在内容分发中提供群集方案,以容纳无限数目的内容接收客户端。Another purpose is to provide a clustering scheme in content distribution through a broadcast encryption mechanism that can scale as desired to accommodate an unlimited number of content receiving clients.
附图说明 Description of drawings
下面参考附图更详细地描述本发明的实施例,其中:Embodiments of the invention are described in more detail below with reference to the accompanying drawings, in which:
图1示出了示意性说明使用广播加密的实例内容分发系统的框图。Figure 1 shows a block diagram schematically illustrating an example content distribution system using broadcast encryption.
具体实施方式 Detailed ways
在下文中,阐述了通过重新使用原来的密码头生成和加密计算结果的广播加密优化和通过使用集群的可缩放性的系统和方法作为优选的例子。对于本领域技术人员显而易见,在不背离本发明的精神和范围的情况下可以做出改变,包括增加和/或替换。可以省略特定细节以便不会遮掩本发明的特征;然而,公开内容被写成使本领域技术人员能在不进行过度试验的情况下实践这里的教导。In the following, a system and method for broadcast encryption optimization by reusing original cipher header generation and encryption calculation results and scalability by using clusters is described as a preferred example. It will be apparent to those skilled in the art that changes, including additions and/or substitutions, can be made without departing from the spirit and scope of the present invention. Certain details may be omitted so as not to obscure the characteristics of the present invention; however, the disclosure is written to enable one skilled in the art to practice the teachings herein without undue experimentation.
内容分发网络至少包括内容分发器和接收内容的一个或多个用户或客户端。广播加密主要是包括启动、加密和解密处理的多个处理的排序组合。A content distribution network includes at least a content distributor and one or more users or clients that receive content. Broadcast encryption is primarily a sequenced combination of multiple processes including initiation, encryption, and decryption processes.
根据一些传统广播加密机制,包括Boneh-Gentry-Waters广播加密机制,启动处理的主要输出是公共密钥和私有密钥。启动处理首先选择随机数发生器g∈G和随机数α∈Zp。其计算公共参数gi=g(αi)∈G,i=1,2,...,n,n+2,...,2n,其中n是在内容分发网络中的内容接收客户端的总数。然后选择随机数γ∈Zp并且设置v=gγ∈G。公共密钥被定义为:According to some traditional broadcast encryption mechanisms, including the Boneh-Gentry-Waters broadcast encryption mechanism, the main output of the boot process is the public key and the private key. The start-up process first selects a random number generator g∈G and a random number α∈Z p . It calculates the public parameter g i = g (αi) ∈ G, i = 1, 2, ..., n, n+2, ..., 2n, where n is the total number of content receiving clients in the content distribution network . Then choose a random number γ∈Zp and set v=g γ∈G . The public key is defined as:
PK=(g,g1,...,gn,gn+2,...,g2n,v)∈G2n+1 PK=(g, g 1 , . . . , g n , g n+2 , . . . , g 2n , v)∈G 2n+1
私有密钥被定义为:The private key is defined as:
di=gi γ∈G,i∈{1,...,n},其中i表示在内容分发网络中的某个内容接收客户端。d i = g i γ ∈ G, i ∈ {1, . . . , n}, where i represents a certain content receiving client in the content delivery network.
私有密钥di,...,dn要被分发给内容接收客户端。每个内容接收客户端要接收并保存要在随后的解密处理中使用的一个私有密钥。The private keys d i , . . . , d n are to be distributed to content receiving clients. Each content receiving client receives and stores a private key to be used in the subsequent decryption process.
加密处理采用生成的公共密钥PK和订户集S来生成用于加密要被分发的原始内容的加密机密和密码文本,该密码作为密码头的一部分,用于与加密内容一起分发给内容接收客户端。加密处理首先选择随机数t∈Zp。加密机密被定义为:The encryption process employs the generated public key PK and the subscriber set S to generate an encrypted secret and ciphertext for encrypting the original content to be distributed as part of the cipher header for distribution with the encrypted content to content receiving customers end. The encryption process first selects a random number t∈Z p . An encrypted secret is defined as:
K=e(gn+1,g)t K=e(g n+1 , g) t
密码文本被定义为:The cipher text is defined as:
Hdr=(gt,(v∏j∈S gn+1-j)t)∈G2 Hdr=(g t ,(v∏ j∈S g n+1-j ) t )∈G 2
=(C0,C1)=(C 0 ,C 1 )
解密处理由分发网络中的每个内容接收客户端执行。在电视广播网络中,内容接收客户端通常是接收机机顶盒。当内容接收客户端i接收密码头(其包括密码)和加密的内容时,解密处理采取其原来接收并保存的客户端私有密钥di,以及密码文本Hdr来重构加密机密K用于解密加密的内容。加密机密K可以如下计算:Decryption processing is performed by each content receiving client in the distribution network. In a television broadcast network, the content receiving client is usually a receiver set-top box. When the content receiving client i receives the cryptographic header (which includes the password) and the encrypted content, the decryption process adopts the client private key d i received and stored originally, and the ciphertext Hdr to reconstruct the encrypted secret K for decryption encrypted content. The encryption secret K can be computed as follows:
K=e(gi,C1)/e(di∏j∈S,j≠ign+1-j+i,C0)K=e(g i , C 1 )/e(d i ∏ j∈S, j≠i g n+1-j+i , C 0 )
通过从私有密钥di和密码文本Hdr重建的加密机密K,使用加密机密K解密被加密的内容。结果是解密的内容等于原始内容。因为当加密原始内容时加密处理考虑了订户集S,仅订户集S内有效的订户可以成功地解密被加密的内容。The encrypted content is decrypted using the encryption secret K by reconstructing the encryption secret K from the private key d i and the ciphertext Hdr. The result is that the decrypted content is equal to the original content. Because the encryption process takes into account the subscriber set S when encrypting the original content, only subscribers valid within the subscriber set S can successfully decrypt the encrypted content.
图1示出了示意性说明使用广播加密的实例内容分发系统的框图。根据图1,内容接收客户端120接收有全局公开值并按照如下方式运行。Figure 1 shows a block diagram schematically illustrating an example content distribution system using broadcast encryption. According to FIG. 1 , the
步骤1,内容接收客户端120,即图中所示机顶盒向认证服务器发送认证请求;Step 1, the
步骤2,认证服务器向群集管理服务器发送授权确认请求,群集管理服务器接收该请求后从其对应的授权服务器的实例进行查找,并将查找得到的授权确认发送回认证服务器;Step 2, the authentication server sends an authorization confirmation request to the cluster management server, and after receiving the request, the cluster management server searches from its corresponding instance of the authorization server, and sends the authorization confirmation obtained after the search back to the authentication server;
步骤3,认证服务器向群集管理服务器发送内容指定的私有密钥的请求,群集管理服务器接收该请求后根据群集方案130从其对应的密钥服务器的实例进行查找,并将查找得到的内容指定的私有密钥发送回认证服务器;Step 3: The authentication server sends a request for the specified private key to the cluster management server. After receiving the request, the cluster management server searches from the instance of the corresponding key server according to the
步骤4,认证服务器将内容指定的私有密钥发送回内容接收客户端120;Step 4, the authentication server sends the private key specified by the content back to the
步骤5,将内容接收客户端120放入内容指定的分发网络,其中加密服务器110将清楚的内容加密为具有内容指定的公开值的加密后的内容,并将该加密的内容和当前订户集发送给分发网络,而后内容接收客户端120收到该加密的内容和当前订户集;Step 5, put the
步骤6,内容接收客户端120根据全局公开值使用内容指定的私有密钥解密加密后的内容,得到清楚的内容。In step 6, the
参考图1,根据当前要求保护的发明的各种实施例,通过在内容分发器中驻留的加密服务器110执行加密处理。加密服务器110可以由一个或多个计算机服务器执行。当订户集改变时,密码文本Hdr需要被重新计算。根据当前要求保护的发明的实施例,通过差分密码文本生成方法从原来的密码文本Hdr计算新的密码文本Hdr’,下面列出了计算步骤:Referring to FIG. 1, according to various embodiments of the presently claimed invention, encryption processing is performed by an
1.当首先生成密码文本Hdr时,保留变体pHdr,其中1. When the ciphertext Hdr is first generated, the variant pHdr is retained, where
pHdr=(g,H)=(g,(v∏j∈Sgn+1-j))pHdr=(g, H)=(g, (v∏ j∈S g n+1-j ))
2.当改变订户集S时,从pHdr计算新的变体pHdr’=(g,H’)2. When changing the subscriber set S, calculate the new variant pHdr' = (g, H') from pHdr
a.当新的内容接收客户端集S+被加入到S,则H’=H∏j∈S +gn+1-j a. When a new content receiving client set S + is added to S, then H'=H∏ j∈S + g n+1-j
b.当从S移除现有的内容接收客户端集S-,则H’=H/∏j∈S -gn+1-j b. When the existing content receiving client set S - is removed from S, then H'=H/∏ j∈S - g n+1-j
3.从pHdr’计算Hdr’:3. Calculate Hdr' from pHdr':
a.生成新的随机数t’∈Zp a. Generate a new random number t'∈Z p
b.计算Hdr’=(gt’,(H’)t’)b. Calculate Hdr'=(g t ', (H') t ')
仍然参考图1,根据当前要求保护的方面的各种实施例,由在分发网络中的每个内容接收客户端120执行解密处理。在电视广播网络中,内容接收客户端120通常是接收机机顶盒,包括用于执行解密处理的电子电路和处理器。解密处理首先包括重构加密机密K,用于根据以下公式解密接收到的加密内容:Still referring to FIG. 1 , according to various embodiments of the presently claimed aspects, the decryption process is performed by each
K=e(gi,C1)/e(di∏j∈S,j≠ign+1-j+1,C0)K=e(g i , C 1 )/e(d i ∏ j∈S, j≠i g n+1-j+1 , C 0 )
这个计算涉及两个双线性配对、一个除法和m+1个点加,其中m是订户集S中订户的数目。根据当前要求保护的发明的实施例,可以通过使用宽窗点加方法加速解密过程。该宽窗点加方法通过预先计算并保存公共参数{g,g1,...,gn,gn+2,...,g2n}的多个预先计算的结果可以加速∏j∈s,j≠ign+1-j+i的计算。宽窗点加方法包括以下步骤:This computation involves two bilinear pairings, a division and m+1 point additions, where m is the number of subscribers in the subscriber set S. According to an embodiment of the presently claimed invention, the decryption process can be accelerated by using a wide window point addition method. The wide-window point addition method can speed up ∏ j∈ Calculation of s, j≠i g n+1-j+i . The wide window point addition method includes the following steps:
1.选择宽窗宽度k1. Choose wide window width k
2.将公共参数组{g,g1,...,gn,gn+2,...,g2n}重新命名为{r1,...,rn,rn+2,...,r2n}2. Rename the public parameter group {g, g1 , ..., gn , gn+2 , ..., g2n } to { r1 , ..., rn , rn +2 , ..., r2n }
3.将组{r1,...,rn,rn+2,...,r2n}划分为[2n/k]个子组,使得:3. Divide the group {r 1 , ..., r n , r n+2 , ..., r 2n } into [2n/k] subgroups such that:
R1={r1,...,rk}R 1 ={r 1 ,...,r k }
R2={rk+1,...,r2k}R 2 ={r k+1 ,...,r 2k }
R[2n/k]={r([2n/k]-1)k+1,...,r2n}R [2n/k] = {r ([2n/k]-1)k+1 ,...,r 2n }
4.计算并保存{P1,P2,...,P[2n/k]},其中:4. Compute and save {P 1 , P 2 , ..., P [2n/k] }, where:
对于宽窗点加方法的示例性证明,其中使用了两个宽窗宽度:An exemplary demonstration for the wide-window point addition method, where two wide window widths are used:
k=2k=2
R1={r1,r2}→P1={r1,r2,r1+r2}R 1 ={r 1 , r 2 }→P 1 ={r 1 ,r 2 ,r 1 +r 2 }
对于宽窗点加方法的另一个示例性证明,其中使用了四个宽窗宽度:Another exemplary demonstration for the wide-window point-add method, where four wide window widths are used:
k=4k=4
R1={r1,r2,r3,r4}→R 1 = {r 1 , r 2 , r 3 , r 4 }→
P1={r1,r2,r3,r4,P 1 = {r 1 , r 2 , r 3 , r 4 ,
r1+r2,r1+r3,r1+r4,r 1 +r 2 , r 1 +r 3 , r 1 +r 4 ,
r2+r3,r2+r4,r3+r4,r 2 +r 3 , r 2 +r 4 , r 3 +r 4 ,
r1+r2+r3,r1+r2+r4,r 1 +r 2 +r 3 , r 1 +r 2 +r 4 ,
r1+r3+r4,r2+r3+r4,r 1 +r 3 +r 4 , r 2 +r 3 +r 4 ,
r1+r2+r3+r4}r 1 +r 2 +r 3 +r 4 }
为了计算∏j∈S,j≠ign+1-j+i用于重建加密机密K,首先设置S’={gn+1-j+i|j∈S,j≠i},然后确定所有的组Ui={Ri∩S’}。并且对于所有确定在预先计算的值Pi中的所有元素Ui的积。最后∏j∈S,j≠ign+1-j+l=∏i=1 [2n/k]uj,uj∈Ui,其中因为Pi可以被预先计算并保存,所以减少了用于随后重建加密机密K的时间,增加了解密处理的性能。To compute ∏ j∈S,j≠i g n+1-j+i for reconstructing the encrypted secret K, first set S'={g n+1-j+i |j∈S,j≠i}, then All sets U i ={R i ∩S'} are determined. and for all Determine the product of all elements U i in the precomputed values Pi. Finally ∏ j∈S, j≠i g n+1-j+l =∏ i=1 [2n/k] u j , u j ∈ U i , where Since Pi can be pre-computed and saved, the time for subsequent reconstruction of the encrypted secret K is reduced, increasing the performance of the decryption process.
仍然参考图1,除了生成公共密钥PK和私有密钥di,...,dn之外,启动处理通常包括认证和授权内容接收客户端并且确定他们接入某些内容的授权或订阅的操作。由此确定订户集S。因为在初始启动处理中生成的私有密钥的数目由总内容接收客户端总数的数目n固定,此后不能增加该客户端总数。Still referring to FIG. 1 , in addition to generating public keys PK and private keys di ,..., dn , the initiation process typically includes authenticating and authorizing content receiving clients and determining their authorization or subscription to access certain content operation. From this the set S of subscribers is determined. Since the number of private keys generated in the initial startup process is fixed by the number n of the total content receiving client population, the client population cannot be increased thereafter.
根据当前要求保护的发明的各种实施例,通过使用群集方案130可以消除该限制,在群集方案中内容接收客户端被划分为不同的群集。该划分可以是基于内容接收客户端的地理位置。群集方案130包括用于公共和私有密钥生成的密钥服务器、用于存储和提供内容接收客户端的授权信息的授权服务器以及群集管理服务器的多个实例。群集管理服务器包含每个内容接收客户端的信息、内容接收客户端所属的密钥服务器和授权服务器的实例的信息。通过利用密钥服务器的多个实例,内容分发系统具有公开密钥和私有密钥的多个集合。每个内容接收客户端从其对应的密钥服务器的实例接收私有密钥。According to various embodiments of the presently claimed invention, this limitation may be eliminated by using a
使用群集方案,对于每个实例分别生成公开参数和订户集。修改加密处理以生成对应于实例的加密内容和密码头的多个集合,并且根据内容接收客户端所属的他们的实例来分发给内容接收客户端。Using the clustering scheme, the public parameters and subscriber sets are generated separately for each instance. The encryption process is modified to generate multiple sets of encrypted content and cryptographic headers corresponding to instances and distributed to content receiving clients according to their instance to which they belong.
随后可以将密钥服务器和授权服务器的新的实例加入到内容分发系统,由此扩展其容量。根据要求保护的发明的实施例,群集管理服务器提供用户管理界面,用于配置内容接收客户端与密钥服务器和授权服务器的实例之间的映射信息。New instances of key servers and authorization servers can then be added to the content distribution system, thereby expanding its capacity. According to an embodiment of the claimed invention, the cluster management server provides a user management interface for configuring mapping information between content receiving clients and instances of key servers and authorization servers.
可以利用通用或者专用计算设备、计算机处理器、或者电子电路实现本文公开的实施例,所述电子电路包括但不限于数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)和根据本发明所教导的配置或者编程的其他可编程逻辑设备。运行在通用或者专用计算设备、计算机处理器或者可编程逻辑设备上的计算机指令或软件代码可以由软件或电子领域技术人员根据本发明的教导容易地准备。Embodiments disclosed herein may be implemented using general or special purpose computing devices, computer processors, or electronic circuitry including, but not limited to, digital signal processors (DSPs), application specific integrated circuits (ASICs), field programmable gate arrays (FPGA) and other programmable logic devices configured or programmed according to the teachings of the present invention. Computer instructions or software codes to run on a general or special purpose computing device, computer processor or programmable logic device can be readily prepared by one skilled in the software or electronics arts from the teachings of the present invention.
在一些实施方式中,本发明包括计算机存储媒介,该计算机存储媒介在其中存储有计算机指令或软件代码,该计算机指令或软件代码可以用来为计算机或微处理器编程以执行本发明的任何程序。存储媒介可以包括但不限于软盘、光盘、蓝光盘、DVD、CD-ROM和磁光盘、ROM、RAM、闪存或者适于存储指令、代码和/或数据的任何类型的媒介或设备。In some embodiments, the present invention includes computer storage media having stored therein computer instructions or software code that can be used to program a computer or microprocessor to perform any of the procedures of the present invention . Storage media may include, but is not limited to, floppy disks, optical disks, Blu-ray disks, DVD, CD-ROM and magneto-optical disks, ROM, RAM, flash memory, or any type of medium or device suitable for storing instructions, code and/or data.
出于展示和描述的目的,提供了本发明的前述描述。其并不旨在排除或者将本发明限制在所公开的精密形式。对于所属领域技术人员而言,很多修改和变型是显而易见的。The foregoing description of the invention has been presented for purposes of illustration and description. It is not intended to exclude or limit the invention to the precise forms disclosed. Many modifications and variations will be apparent to those skilled in the art.
为了更好地解释本发明的原理及其实际应用,选择和描述了那些实施方式,从而使得所属领域技术人员能够理解本发明的各个实施方式和适于预想的实际应用的各种修改。本发明的范围由所附权利要求及其等效物限定。Those embodiments were chosen and described in order to better explain the principles of the invention and its practical application, thereby enabling those skilled in the art to understand the invention for various embodiments and with various modifications as are suited to the practical application contemplated. The scope of the invention is defined by the appended claims and their equivalents.
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110355327.7A CN102394744B (en) | 2011-11-10 | 2011-11-10 | Systems and methods for content distribution using broadcast encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110355327.7A CN102394744B (en) | 2011-11-10 | 2011-11-10 | Systems and methods for content distribution using broadcast encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102394744A CN102394744A (en) | 2012-03-28 |
CN102394744B true CN102394744B (en) | 2014-04-16 |
Family
ID=45861953
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110355327.7A Active CN102394744B (en) | 2011-11-10 | 2011-11-10 | Systems and methods for content distribution using broadcast encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102394744B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102694819B (en) * | 2012-06-13 | 2015-07-22 | 苏州大学 | Streaming media transmission method based on broadcast encryption |
US9516000B2 (en) * | 2015-03-27 | 2016-12-06 | International Business Machines Corporation | Runtime instantiation of broadcast encryption schemes |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001186119A (en) * | 1999-12-22 | 2001-07-06 | Nippon Telegr & Teleph Corp <Ntt> | Key management method and key management device using tree structure and recording medium |
CN101044754A (en) * | 2004-11-12 | 2007-09-26 | 三星电子株式会社 | Method of managing user key for broadcast encryption |
CN101150394A (en) * | 2006-09-22 | 2008-03-26 | 中国科学院声学研究所 | A Client Extension Method of Subset Differential/Hierarchical Subset Differential Mechanism |
CN101150395A (en) * | 2006-09-22 | 2008-03-26 | 中国科学院声学研究所 | A Four-layer Encryption Method for Encrypting Double Packets of Authorization Management System |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7450722B2 (en) * | 2002-12-13 | 2008-11-11 | General Instrument Corporation | Subset difference method for multi-cast rekeying |
US7477738B2 (en) * | 2005-12-21 | 2009-01-13 | General Instrument Corporation | Data sequence encryption and decryption |
KR100929226B1 (en) * | 2007-08-22 | 2009-12-01 | 한국과학기술원 | Key Management Method in User Group for Broadcast Encryption |
US8468341B2 (en) * | 2009-03-04 | 2013-06-18 | Hong Kong Applied Science and Technology Research Institute Company Limited | System and method for content distribution with broadcast encryption |
EP2355503A1 (en) * | 2010-02-04 | 2011-08-10 | Nagravision S.A. | Method to manage members of at least one group of decoders having access to audio/video data |
-
2011
- 2011-11-10 CN CN201110355327.7A patent/CN102394744B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001186119A (en) * | 1999-12-22 | 2001-07-06 | Nippon Telegr & Teleph Corp <Ntt> | Key management method and key management device using tree structure and recording medium |
CN101044754A (en) * | 2004-11-12 | 2007-09-26 | 三星电子株式会社 | Method of managing user key for broadcast encryption |
CN101150394A (en) * | 2006-09-22 | 2008-03-26 | 中国科学院声学研究所 | A Client Extension Method of Subset Differential/Hierarchical Subset Differential Mechanism |
CN101150395A (en) * | 2006-09-22 | 2008-03-26 | 中国科学院声学研究所 | A Four-layer Encryption Method for Encrypting Double Packets of Authorization Management System |
Non-Patent Citations (8)
Title |
---|
《Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys》;Dan Boneh,Craig Gentry,Brent Waters;《Crypto 2005 LNCS 3621》;20051231;258-260 * |
《Revocation and Tracing Schemes for Stateless Receivers》;D. Naor, M. Naor, and J. Lotspiech;《Crypto 2001》;20011231;41–62 * |
《基于对的群体密码学研究》;秦波;《中国博士学位论文全文数据库 信息科技辑》;20090115(第 1 期);I136-8 * |
《基于广播加密的叛逆者追踪研究》;张学军;《中国博士学位论文全文数据库 信息科技辑》;20080415(第 4 期);I138-2 * |
D. Naor, M. Naor, and J. Lotspiech.《Revocation and Tracing Schemes for Stateless Receivers》.《Crypto 2001》.2001,41–62. |
Dan Boneh,Craig Gentry,Brent Waters.《Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys》.《Crypto 2005 LNCS 3621》.2005,258-275. |
张学军.《基于广播加密的叛逆者追踪研究》.《中国博士学位论文全文数据库 信息科技辑》.2008,(第 4 期),I138-2. |
秦波.《基于对的群体密码学研究》.《中国博士学位论文全文数据库 信息科技辑》.2009,(第 1 期),I136-8. |
Also Published As
Publication number | Publication date |
---|---|
CN102394744A (en) | 2012-03-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication | |
US8468341B2 (en) | System and method for content distribution with broadcast encryption | |
CN105049207B (en) | A kind of broadcast encryption scheme with customized information of identity-based | |
JP2014535199A (en) | Secure distribution of content | |
Ming et al. | Efficient revocable multi-authority attribute-based encryption for cloud storage | |
Vijayakumar et al. | An effective key distribution for secure internet pay‐TV using access key hierarchies | |
CN109543439A (en) | A kind of service request method and device of car networking | |
Udendhran | A hybrid approach to enhance data security in cloud storage | |
Kaaniche et al. | Cloudasec: A novel public-key based framework to handle data sharing security in clouds | |
US8483390B2 (en) | Systems and methods for broadcast encryption optimization and scalability | |
Bellafqira et al. | Proxy re-encryption based on homomorphic encryption | |
Pal et al. | Efficient and secure key management for conditional access systems | |
CN114900283B (en) | Deep learning user gradient aggregation method based on multiparty security calculation | |
CN102394744B (en) | Systems and methods for content distribution using broadcast encryption | |
Hong et al. | A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud | |
CN113312647A (en) | Multi-agent data sharing method based on block chain storage | |
CN111541669A (en) | A broadcast encryption method and system | |
Fu et al. | Secure multi-receiver communications: Models, proofs, and implementation | |
JP5457979B2 (en) | Conditional reception system, message distribution device, message reception device, message distribution program, and message reception program | |
CN111371760B (en) | Broadcast encryption method and system based on certificate | |
Mishra et al. | A certificateless authenticated key agreement protocol for digital rights management system | |
CN111510295A (en) | A certificate-based anonymous broadcast encryption method and system that can transmit personal messages | |
CN102324994B (en) | Systems and methods for broadcast encryption optimization and scalability | |
Michael | Security and Privacy issues of IoT at Fog layer architecture | |
CN115361114B (en) | Fuzzy identification-based encryption system and method based on SM9 supporting large attributes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |