Efficient Broadcast Encryption Scheme Based on Number Theory Research Unit

被引:0
作者
ZHANG Weidong L Xixiang LI Hui State Key Laboratory of Integrated Service Networks XidianUniversity Xian Shaanxi China [710071 ]
机构
关键词
broadcast encryption; traitor tracing; software protection; information security;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
In this paper, a new broadcast encryption scheme is proposed by using the efficient and computationally inexpensive public key cryptosystem NTRU (number theory research unit). In our scheme, we use the idea of RSA and develop this idea from two-party to multi-party, and combine this multi-party public key idea with the multiplication in ring R of NTRU. What we get from this design is extremely efficient encryption and decryption, fast and easy key creation, low memory requirements and revocation property, etc. Moreover, this novel work contains other desirable features, such as traitor tracing. With its complexity only O(log2n), the tracing algorithm of this system is more efficient than that of the previous ones.
引用
收藏
页码:247 / 250
页数:4
相关论文
共 12 条
[1]  
Boneh D,Gentry C,Waters B.Collusion resistant broadcast encryption with short ciphertexts and private keys. Proceedings of Crypto’2005 . 2005
[2]  
Chor B,Fiat A,Naor M,et al.Tracing traitors. IEEE Transactions on Information Theory . 2000
[3]  
Chor B,Fiat A,Naor M.Tracing Traitors. Advance in Cryptology-CRYPTO’94 . 1994
[4]  
Chabanne H,Phan D,Pointcheval D.Public traceability in traitor tracing schemes. Proceedings of Eurocrypt’2005 . 2005
[5]  
Boneh D,Sahai A,Waters B.Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. Proc.of Eurocrypt’06 . 2006
[6]  
Dodis Y,Fazio N.Public key broadcast encryption secure against adaptive chosen ciphertext attack. Proceedings of PKC’03 . 2003
[7]  
KUROSAWA K,DESMEDTY.Optimum Traitor Tracing and Asymmetric Schemes. . 1998
[8]  
Kiayias A,Yung Moti.Traitor tracing with constanttransmission rate. Proceedings of InternationalConference on the Theory and Applications of Crypto-graphic Techniques . 2002
[9]  
Michel A,Alexander W D,Lee J M.Identity-Based traitor tracing. http://www.isg.rhul.ac.uk/~ale x/papers/id-tt.pdf . 2008
[10]  
Goldreich O,Goldwasser S,Halevi S.Public-key cryptosystems from lattice reduction problems. Proceedings of Crypto 1997 . 1997