CN102394744A - System of using broadcast encryption to carry out content distribution and method thereof - Google Patents

System of using broadcast encryption to carry out content distribution and method thereof Download PDF

Info

Publication number
CN102394744A
CN102394744A CN2011103553277A CN201110355327A CN102394744A CN 102394744 A CN102394744 A CN 102394744A CN 2011103553277 A CN2011103553277 A CN 2011103553277A CN 201110355327 A CN201110355327 A CN 201110355327A CN 102394744 A CN102394744 A CN 102394744A
Authority
CN
China
Prior art keywords
content
subscriber
trooping
reception client
content reception
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011103553277A
Other languages
Chinese (zh)
Other versions
CN102394744B (en
Inventor
梁永斌
熊小康
屈耀荣
雷志斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hong Kong Applied Science and Technology Research Institute ASTRI
Original Assignee
Hong Kong Applied Science and Technology Research Institute ASTRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hong Kong Applied Science and Technology Research Institute ASTRI filed Critical Hong Kong Applied Science and Technology Research Institute ASTRI
Priority to CN201110355327.7A priority Critical patent/CN102394744B/en
Publication of CN102394744A publication Critical patent/CN102394744A/en
Application granted granted Critical
Publication of CN102394744B publication Critical patent/CN102394744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A system of using broadcast encryption to carry out content distribution and a method thereof are disclosed. The method comprises the following steps that: a server which takes charge of a content distributor initially executes starting processing for one time, wherein the starting processing generates a public key and one or more private keys; the server which takes charge of the content distributor executes encryption processing and distributes the one or more private keys, an initial password or a new password and the encrypted content into one or more content receiving clients in a distribution network; a subscriber set is a subset of all the content receiving clients in the distribution network and only can the content receiving clients in the subscriber set decrypt the encrypted content into the initial content; when one or more new subscribers join in the subscriber set or one or more current users remove from the subscriber set, the subscriber set changes; in a differential password generation method, through reusing a stored calculating result which is calculated by using the original password, the new password can be calculated.

Description

Use broadcast enciphering to carry out the system and method for content distribution
Technical field
Generally relate to network in this claimed invention, particularly computer network or radio network, for example TV.Particularly, relate to the encryption mechanism that is used for being encrypted in the licensed content that network distributes in this claimed invention.
Background technology
In broadcast encryption mechanisms, the content distributor is for the user who listens to broadcasting channel or distributing network or its licensed content of client encrypt.Any user or client can use its private cipher key to come the content of the encryption that receives is deciphered, but only are that the user or the client of selection subsets can be original contents with the contents decryption of encrypting.This subclass can controlled and select to the content distributor.Broadcast enciphering has some application, comprises access control, TV subscription service and media content protection in the file system of encryption.
Traditional broadcast encryption mechanisms; For example use those broadcast encryption mechanisms of Public Key Infrastructure (PKI) or bilinearity pairing; Establishment is based in part on the password head of subscriber's collection, and this subscriber's collection is the subclass that can decipher and watch thus the content reception client of original contents to the content of encrypting.One of these traditional broadcast encryption mechanisms are the Boneh-Gentry-Waters broadcast encryption mechanisms.The Boneh-Gentry-Waters broadcast encryption mechanisms is described in following report: Dan Boneh; Craig Gentry; With Brent Waters, Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys, Crypto; 2005, its disclosed entirety is incorporated into as a reference at this.In this broadcast encryption mechanisms, when increasing along with new subscriber and expired subscriber removes and when changing the subscriber and collecting, create and distribute new password head.Under the situation of not reusing any original result of calculation, carry out the calculating of new password head.In addition, also under the situation of not reusing any original result of calculation, carry out the deciphering of the content of encrypting.Thus, the amount of calculation of the deciphering of first-born one-tenth of password and encrypted content is big and consuming time when the subscriber collects renewal, and causes the deterioration of entirety distribution performance.Disclosed among the U.S. Patent application No.12/397635 of existing broadcast encryption mechanisms like application on March 4th, 2009, its full content is incorporated into as a reference at this.
Another shortcoming of traditional broadcast encryption mechanism be this encryption mechanism need be when initially the setting up of system in distributing network the sum of content reception client fix, and after this can not increase.
Thus; Need new broadcast encryption mechanisms; When the subscriber collects change; This new broadcast encryption mechanisms can be utilized original result of calculation better in the contents decryption process of first-born one-tenth of password and encryption, and this new broadcast encryption mechanisms is enough strong to handle unlimited total content reception client sum.
Summary of the invention
Be that in the purpose of this claimed invention the broadcast encryption mechanisms of first-born one-tenth of the password that provides a kind of use to have optimization and deciphering carries out method of content distribution and system.
Another purpose is when the subscriber collects change, to realize optimizing through the original result of calculation of reusing in first-born one-tenth of password and the deciphering.Through using difference cryptogram generation method, this method can reduce to be used to generate the amount of calculation of password head based on original cryptogram value.For decryption processing, use wide window point to add (wide window point addition) method and calculate and preserve the reconstruction part of encrypted confidential in advance.Thus, subsequently encrypted confidential is rebuild and can be depended on precalculated result with the speed-up computation time.
Another purpose is through can in the content distribution, the scheme of trooping being provided according to the broadcast encryption mechanisms of expectation expansion, to hold the content reception client of infinite number.
Description of drawings
Be described in greater detail with reference to the attached drawings embodiments of the invention below, wherein:
Fig. 1 shows the block diagram that schematic illustration uses the example content dissemination system of broadcast enciphering.
Embodiment
The system and method for hereinafter, having set forth broadcast enciphering optimization and the scalability through using cluster through reusing first-born one-tenth of original password and cryptographic calculation results is as preferred example.It will be apparent to those skilled in the art that under the situation that does not deviate from the spirit and scope of the present invention and can make a change, comprise increasing and/or replacement.Specific detail can be omitted so that can not cover characteristic of the present invention; Yet disclosure is write as makes those skilled in the art can under the situation of not carrying out undue experimentation, put into practice the instruction here.
Content distributing network comprises the one or more users or the client of content distributor and received content at least.Broadcast enciphering mainly is the ordering combination that comprises a plurality of processing of startup, encryption and decryption processing.
According to some traditional broadcast encryption mechanisms, comprise the Boneh-Gentry-Waters broadcast encryption mechanisms, starting the main output of handling is public keys and private cipher key.Start to handle and at first select randomizer g ∈ G and random number α ∈ Z pIt calculates common parameter g i=g (α i)∈ G, i=1,2 ..., n, n+2 ..., 2n, wherein n is the sum of the content reception client in content distributing network.Select random number γ ∈ Z then pAnd v=g is set γ∈ G.Public keys is defined as:
PK=(g,g 1,...,g n,g n+2,...,g 2n,v)∈G 2n+1
Private cipher key is defined as:
d i=g i γ∈ G, i ∈ 1 ..., and n}, wherein i is illustrated in certain the content reception client in the content distributing network.
Private cipher key d i..., d nBe distributed to the content reception client.Each content reception client will receive and preserve a private cipher key that will in decryption processing subsequently, use.
Public keys PK that the encryption employing generates and subscriber collect S and generate encrypted confidential and the cryptogram that is used to encrypt the original contents that will be distributed, and this password is used for being distributed to the content reception client with encrypted content as the part of password head.Random number t ∈ Z is at first selected in encryption pEncrypted confidential is defined as:
K=e(g n+1,g) t
Cryptogram is defined as:
Hdr=(g t,(v∏ j∈S?g n+1-j) t)∈G 2
=(C 0,C 1)
Decryption processing is by each the content reception client executing in the distributing network.In tv broadcast network, the content reception client is the receiver STB normally.When content reception client i received the content of password head (it comprises password) and encryption, decryption processing was taked its original client private cipher key d that receives and preserve i, and cryptogram Hdr comes reconstruct encrypted confidential K to be used for the content of enabling decryption of encrypted.Encrypted confidential K can calculate as follows:
K=e(g i,C 1)/e(d ij∈S,j≠ig n+1-j+i,C 0)
Through from private cipher key d iWith the encrypted confidential K that cryptogram Hdr rebuilds, use the content of encrypted confidential K decrypt encrypted.The result is that the content of deciphering equals original contents.Because encryption has considered that the subscriber collects S when encrypting original contents, only the subscriber collects the successfully content of decrypt encrypted of the interior effectively subscriber of S.
Fig. 1 shows the block diagram that schematic illustration uses the example content dissemination system of broadcast enciphering.According to Fig. 1,120 receptions of content reception client have the open value of the overall situation and move according to following mode.
Step 1, content reception client 120, promptly STB shown in the figure sends authentication request to certificate server;
Step 2, certificate server are sent to authorize to the cluster management server and are confirmed that request, cluster management server receive this request back and search from the instance of its corresponding authorization server, and will search the mandate that obtains and confirm to send it back certificate server;
Step 3; Certificate server sends the request of the private cipher key of content appointment to the cluster management server; The cluster management server receives this request back basis scheme 130 of trooping and searches from the instance of its corresponding key server, and the private cipher key that will search the content appointment that obtains sends it back certificate server;
Step 4, certificate server sends it back content reception client 120 with the private cipher key of content appointment;
Step 5; Content reception client 120 is put into the distributing network of content appointment; Wherein encryption server 110 clearly content-encrypt be the content that has after the encryption of open value of content appointment; And the content that will encrypt and current subscriber collection sends to distributing network, and then content reception client 120 is received the content and the current subscriber collection of this encryption;
Step 6, content reception client 120 openly are worth the content behind the private cipher key enabling decryption of encrypted that uses the content appointment according to the overall situation, obtain clearly content.
With reference to figure 1, the various embodiment according to current claimed invention perform encryption processing through encryption server resident in content distributor 110.Encryption server 110 can be carried out by one or more computer servers.When the subscriber collected change, cryptogram Hdr need be recomputated.According to the embodiment of current claimed invention, calculate new cryptogram Hdr ' through difference cryptogram generation method from original cryptogram Hdr, listed calculation procedure below:
1. when at first generating cryptogram Hdr, keep variant pHdr, wherein
pHdr=(g,H)=(g,(v∏ j∈Sg n+1-j))
2. when the change subscriber collects S, calculate new variant pHdr '=(g, H ') from pHdr
A. as new content reception client collection S +Be added into S, then H '=H ∏ J ∈ S +g N+1-j
B. when removing existing content reception client collection S from S -, H '=H/ ∏ then J ∈ S -g N+1-j
3. calculate Hdr ' from pHdr ':
A. generate new random number t ' ∈ Z p
B. calculate Hdr '=(g t', (H ') t')
Still with reference to figure 1, the various embodiment according to the aspect of current requirement protection carry out decryption processing by each the content reception client 120 in distributing network.In tv broadcast network, content reception client 120 is the receiver STB normally, comprises the electronic circuit and the processor that are used to carry out decryption processing.Decryption processing at first comprises reconstruct encrypted confidential K, is used for the encrypted content that receives according to following formula deciphering:
K=e(g i,C 1)/e(d ij∈S,j≠ig n+1-j+1,C 0)
This calculating relates to two bilinearity pairings, a division and m+1 point and adds, and wherein m is the number that the subscriber collects subscriber among the S.According to the embodiment of current claimed invention, can quicken decrypting process through using wide window point adding method.This wide window point adding method is through calculate and preserve common parameter { g, g in advance 1..., g n, g N+2..., g 2nA plurality of precalculated result can quicken ∏ J ∈ s, j ≠ ig N+1-j+iCalculating.Wide window point adding method may further comprise the steps:
1. select wide window width k
2. with common parameter group { g, g 1..., g n, g N+2..., g 2nRename and be { r 1..., r n, r N+2..., r 2n}
3. will organize { r 1..., r n, r N+2..., r 2nBe divided into [2n/k] height group, make:
R 1={r 1,...,r k}
R 2={r k+1,...,r 2k}
......
R [2n/k]={r ([2n/k]-1)k+1,...,r 2n}
4. calculate and preserve { P 1, P 2..., P [2n/k], wherein:
Figure BDA0000107183080000061
For the exemplary proof of wide window point adding method, wherein used two wide window widths:
k=2
R 1={r 1,r 2}→P 1={r 1,r 2,r 1+r 2}
...
For another exemplary proof of wide window point adding method, wherein used four wide window widths:
k=4
R 1={r 1,r 2,r 3,r 4}→
P 1={r 1,r 2,r 3,r 4
r 1+r 2,r 1+r 3,r 1+r 4
r 2+r 3,r 2+r 4,r 3+r 4
r 1+r 2+r 3,r 1+r 2+r 4
r 1+r 3+r 4,r 2+r 3+r 4
r 1+r 2+r 3+r 4}
In order to calculate ∏ J ∈ S, j ≠ ig N+1-j+iBe used to rebuild encrypted confidential K, S '={ g at first is set N+1-j+i| j ∈ S, j ≠ i} confirms all group U then i={ R i∩ S ' }.And for all Confirm at precalculated value P iIn all elements U iLong-pending.Last ∏ J ∈ S, j ≠ ig N+1-j+l=∏ I=1 [2n/k]u j, u j∈ U i, wherein Because P iCan be calculated in advance and preserved,, increased the deciphering processing performance so reduced the time that is used for rebuilding subsequently encrypted confidential K.
Still with reference to figure 1, except generating public keys PK and private cipher key d i..., d nOutside, start processing and generally include authentication and authorization content reception client and confirm that they insert the mandate of some content or the operation of subscription.Confirm that thus the subscriber collects S.Because the number of the private cipher key that in initial start is handled, generates is fixed by the number n of total content reception client sum, after this can not increase this client sum.
According to the various embodiment of current claimed invention, can eliminate this restriction through the use scheme 130 of trooping, the content reception client is divided into different trooping in the scheme of trooping.This division can be based on the geographical position of content reception client.The scheme of trooping 130 comprises the key server that is used for public and private cipher key and generates, be used to store and provide authorization server and a plurality of instances of cluster management server of the authorization message of content reception client.The cluster management server comprises the information of the instance of key server and authorization server under the information, content reception client of each content reception client.Through utilizing a plurality of instances of key server, content delivering system has a plurality of set of public-key cryptography and private cipher key.Each content reception client receives private cipher key from the instance of its corresponding key server.
The use scheme of trooping generates open parameters and subscriber's collection respectively for each instance.Revise encryption generating a plurality of set, and be distributed to the content reception client according to their instance under the content reception client corresponding to the encrypted content and the password head of instance.
Can the new instance of key server and authorization server be joined content delivering system subsequently, expand its capacity thus.The inventive embodiment of protection as requested, the cluster management server provides subscriber administration interface, is used for the map information between the instance that deploy content receives client and key server and authorization server.
Can utilize general or dedicated computing equipment, computer processor or the disclosed embodiment of electronic circuit realization this paper, said electronic circuit includes but not limited to digital signal processor (DSP), application-specific integrated circuit (ASIC) (ASIC), field programmable gate array (FPGA) and the configuration of being instructed according to the present invention or other programmable logic devices of programming.The computer instruction or the software code that operate on general or dedicated computing equipment, computer processor or the programmable logic device can easily be prepared by software or electronic applications technical staff instruction according to the present invention.
In some embodiments; The present invention includes computer storage media; This computer storage media storing therein has computer instruction or software code, this computer instruction or software code can be used for for the programming of computer or microprocessor to carry out any program of the present invention.Storage medium can include but not limited to floppy disk, CD, Blu-ray disc, DVD, CD-ROM and magneto optical disk, ROM, RAM, flash memory or be suitable for the media or the equipment of any kind of store instruction, code and/or data.
From showing and purpose of description, aforementioned description of the present invention is provided.It is not intended to get rid of or limit the present invention to disclosed precise form.For one of ordinary skill in the art, a lot of modifications and modification are conspicuous.
In order to explain principle of the present invention and practical application thereof better, select and described those execution modes, thereby make one of ordinary skill in the art can understand the various modifications of each execution mode of the present invention and the practical application that is suitable for envisioning.Scope of the present invention is limited accompanying claims and equivalent thereof.

Claims (7)

1. content distribution method that uses broadcast enciphering comprises:
Initially carry out one-shot by the server of being responsible for content distributor and handle, said startup is handled and is produced public-key cryptography and one or more private cipher key;
Server by being responsible for content distributor performs encryption processing, and said encryption comprises:
Use public-key cryptography and subscriber collection initially to calculate the initial password text one time;
Calculate new cryptogram when changing when the subscriber collects, the calculating of said new cryptogram is based on difference cryptogram generation method;
Generate encrypted confidential;
Use encrypted confidential that original contents is encrypted to the content after the encryption;
With one or more private cipher keys, initial password text or new cryptogram and the content after encrypting be distributed to the one or more content reception clients in the distributing network;
Wherein subscriber collection is the subclass that all the elements receive client in the distributing network, and only the content reception client concentrated of subscriber can be an original contents with the contents decryption after encrypting;
Wherein collect when removing from the subscriber when one or more new subscribers add subscriber collection or the subscriber one or more existing subscriber in collecting, the subscriber collects change; And
Wherein difference cryptogram generation method is calculated new cryptogram through the result of calculation of the preservation reusing original cryptogram and calculate.
2. method according to claim 1 also comprises:
With the content reception client logic be divided into a plurality of trooping;
From a plurality of instances of authorization server the authorization message of each content reception client is provided, the instance of authorization server is corresponding to trooping;
From a plurality of instances of key server a plurality of public-key cryptography and a plurality of private cipher key are provided, the instance of key server is corresponding to trooping;
From with the content reception client under the instance of the corresponding key server of trooping private cipher key is distributed to the content reception client;
Calculate a plurality of set of initial password text and new cryptogram, each is trooped one and gathers and collect with the subscriber based on this public-key cryptography of trooping;
Generate a plurality of encrypted confidentials, each encrypted confidential of trooping, and the corresponding cryptogram that uses this to troop;
Original contents is encrypted to the content after a plurality of encryptions, the content after each encryption of trooping, and use the encrypted confidential of this correspondence of trooping; And
According under the content reception client troop initial password text or new cryptogram and the content after encrypting is distributed to said content reception client.
3. method according to claim 2, wherein with the content reception client logic be divided into a plurality of trooping and be based on the geographical position of content reception client.
4. content distribution method that uses broadcast enciphering comprises:
Initially carry out one-shot by the server of being responsible for content distributor and handle, said startup is handled and is produced public-key cryptography and one or more private cipher key;
Server by being responsible for content distributor performs encryption processing, and said encryption comprises:
Use public-key cryptography and subscriber collection initially to calculate the initial password text one time;
When collecting, the subscriber calculates new cryptogram when changing;
Generate encrypted confidential;
Use encrypted confidential that original contents is encrypted to the content after the encryption;
With one or more private cipher keys, initial password text or new cryptogram and the content after encrypting be distributed to the content reception client in the distributing network;
By each the content reception client in the distributing network content after encrypting is carried out decryption processing, said decryption processing is based on wide window point adding method;
Wherein subscriber collection is the subclass that all the elements receive client in the distributing network, and only those content reception clients of concentrating of subscriber can be original contents with the contents decryption after encrypting;
Wherein collect when removing from the subscriber when one or more new subscribers add subscriber collection or the subscriber one or more existing subscriber in collecting, the subscriber collects change; And
Wherein wide window point adding method is reused the result of calculation in advance of the preservation that the grouping point of open parameters adds in the reconstruction of encrypted confidential.
5. method according to claim 4, wherein wide window point adding method also provides configurable wide window width, is used to control the group size that the grouping point of open parameters adds.
6. method according to claim 4 also comprises:
With the content reception client logic be divided into a plurality of trooping;
From a plurality of instances of authorization server the authorization message of each content reception client is provided, the instance of authorization server is corresponding to trooping;
From a plurality of instances of key server a plurality of public-key cryptography and a plurality of private cipher key are provided, the instance of key server is corresponding to trooping;
From with the content reception client under the instance of the corresponding key server of trooping private cipher key is distributed to the content reception client;
Calculate a plurality of set of initial password text and new cryptogram, each is trooped one and gathers, and collects with the subscriber based on this public-key cryptography of trooping;
Generate a plurality of encrypted confidentials, each encrypted confidential of trooping, and the corresponding cryptogram that uses this to troop;
Original contents is encrypted to the content after a plurality of encryptions, the content after each encryption of trooping, and use the encrypted confidential of this correspondence of trooping; And
According under the content reception client troop initial password text or new cryptogram and the content after encrypting is distributed to said content reception client.
7. method according to claim 6, wherein with the content reception client logic be divided into a plurality of trooping and be based on the geographical position of content reception client.
CN201110355327.7A 2011-11-10 2011-11-10 System of using broadcast encryption to carry out content distribution and method thereof Active CN102394744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110355327.7A CN102394744B (en) 2011-11-10 2011-11-10 System of using broadcast encryption to carry out content distribution and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110355327.7A CN102394744B (en) 2011-11-10 2011-11-10 System of using broadcast encryption to carry out content distribution and method thereof

Publications (2)

Publication Number Publication Date
CN102394744A true CN102394744A (en) 2012-03-28
CN102394744B CN102394744B (en) 2014-04-16

Family

ID=45861953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110355327.7A Active CN102394744B (en) 2011-11-10 2011-11-10 System of using broadcast encryption to carry out content distribution and method thereof

Country Status (1)

Country Link
CN (1) CN102394744B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102694819A (en) * 2012-06-13 2012-09-26 苏州大学 Streaming media transmission method based on broadcast encryption
CN107431620A (en) * 2015-03-27 2017-12-01 国际商业机器公司 Instantiated during the operation of broadcast encryption scheme

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001186119A (en) * 1999-12-22 2001-07-06 Nippon Telegr & Teleph Corp <Ntt> Key management method using tree structure and key management system, and recording medium
US20040114762A1 (en) * 2002-12-13 2004-06-17 General Instrument Corporation Subset difference method for multi-cast rekeying
US20070140481A1 (en) * 2005-12-21 2007-06-21 Motorola, Inc. Data sequence encryption and decryption
CN101044754A (en) * 2004-11-12 2007-09-26 三星电子株式会社 Method of managing user key for broadcast encryption
CN101150394A (en) * 2006-09-22 2008-03-26 中国科学院声学研究所 User end extension method for subset difference/layered subset difference mechanism
CN101150395A (en) * 2006-09-22 2008-03-26 中国科学院声学研究所 A L4 encryption method of double group of encrypted authorization management system
KR100929226B1 (en) * 2007-08-22 2009-12-01 한국과학기술원 Key Management Method in User Group for Broadcast Encryption
US20100228972A1 (en) * 2009-03-04 2010-09-09 Hong Kong Applied Science and Technology Research Institute Company Limited System and Method for Content Distribution with Broadcast Encryption
US20110188655A1 (en) * 2010-02-04 2011-08-04 Nagravision Sa Method to manage members of at least one group of decoders having access to broadcast data

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001186119A (en) * 1999-12-22 2001-07-06 Nippon Telegr & Teleph Corp <Ntt> Key management method using tree structure and key management system, and recording medium
US20040114762A1 (en) * 2002-12-13 2004-06-17 General Instrument Corporation Subset difference method for multi-cast rekeying
CN101044754A (en) * 2004-11-12 2007-09-26 三星电子株式会社 Method of managing user key for broadcast encryption
US20070140481A1 (en) * 2005-12-21 2007-06-21 Motorola, Inc. Data sequence encryption and decryption
CN101150394A (en) * 2006-09-22 2008-03-26 中国科学院声学研究所 User end extension method for subset difference/layered subset difference mechanism
CN101150395A (en) * 2006-09-22 2008-03-26 中国科学院声学研究所 A L4 encryption method of double group of encrypted authorization management system
KR100929226B1 (en) * 2007-08-22 2009-12-01 한국과학기술원 Key Management Method in User Group for Broadcast Encryption
US20100228972A1 (en) * 2009-03-04 2010-09-09 Hong Kong Applied Science and Technology Research Institute Company Limited System and Method for Content Distribution with Broadcast Encryption
US20110188655A1 (en) * 2010-02-04 2011-08-04 Nagravision Sa Method to manage members of at least one group of decoders having access to broadcast data

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
D. NAOR, M. NAOR, AND J. LOTSPIECH: "《Revocation and Tracing Schemes for Stateless Receivers》", 《CRYPTO 2001》 *
DAN BONEH,CRAIG GENTRY,BRENT WATERS: "《Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys》", 《CRYPTO 2005 LNCS 3621》 *
张学军: "《基于广播加密的叛逆者追踪研究》", 《中国博士学位论文全文数据库 信息科技辑》 *
秦波: "《基于对的群体密码学研究》", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102694819A (en) * 2012-06-13 2012-09-26 苏州大学 Streaming media transmission method based on broadcast encryption
CN102694819B (en) * 2012-06-13 2015-07-22 苏州大学 Streaming media transmission method based on broadcast encryption
CN107431620A (en) * 2015-03-27 2017-12-01 国际商业机器公司 Instantiated during the operation of broadcast encryption scheme
CN107431620B (en) * 2015-03-27 2020-10-13 国际商业机器公司 Runtime instantiation of broadcast encryption schemes

Also Published As

Publication number Publication date
CN102394744B (en) 2014-04-16

Similar Documents

Publication Publication Date Title
KR101318461B1 (en) System and method for providing authorized access to digital content
CN105049207B (en) A kind of broadcast encryption scheme with customized information of identity-based
CA2742029C (en) Method and system for identity-based key management
US8468341B2 (en) System and method for content distribution with broadcast encryption
CN111082920A (en) Non-interactive verifiable multi-type encrypted data aggregation method facing smart power grid
CN101196973B (en) Digital copyright protection method and system thereof
CN102637246A (en) Method and device for generating control words
Sun et al. Flexible-pay-per-channel: A new model for content access control in pay-TV broadcasting systems
CN101061714A (en) System and method for providing authorized access to digital content
US8483390B2 (en) Systems and methods for broadcast encryption optimization and scalability
CN1292185A (en) Method and apparatus for conveying private message to selected members
CN1258920C (en) Secure digital content delivery system and method over broadcast network
Phan et al. Multi-channel broadcast encryption
Wang et al. Efficient key distribution for access control in pay-TV systems
CN102394744B (en) System of using broadcast encryption to carry out content distribution and method thereof
Wan et al. A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV broadcasting
KR100975038B1 (en) System of Broadcast Encryption and Method thereof
Pal et al. Efficient and secure key management for conditional access systems
JP5457979B2 (en) Conditional reception system, message distribution device, message reception device, message distribution program, and message reception program
WO2016189105A1 (en) Management of broadcast encrypted digital multimedia data receivers
Muthulakshmi et al. Identity based privacy preserving dynamic broadcast encryption for multi-privileged groups
CN102324994B (en) System and method for optimization and expandability of broadcast encryption
Ge et al. A secure fine-grained identity-based proxy broadcast re-encryption scheme for micro-video subscribing system in clouds
US8667272B2 (en) System and method for content distribution with broadcast encryption
Vijayakumar et al. Key distribution for pay-TV system with reduced computation cost using XOR operation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant