Advanced Search
Volume 30 Issue 12
Jan.  2011
Turn off MathJax
Article Contents
Wang Shang-Ping, Jie Kang-Le, Wang Xiao-Feng, Ding Ru-Yi. A Broadcast Encryption Scheme Based on the Interpolating Polynomial[J]. Journal of Electronics & Information Technology, 2008, 30(12): 2996-2998. doi: 10.3724/SP.J.1146.2007.00873
Citation: Wang Shang-Ping, Jie Kang-Le, Wang Xiao-Feng, Ding Ru-Yi. A Broadcast Encryption Scheme Based on the Interpolating Polynomial[J]. Journal of Electronics & Information Technology, 2008, 30(12): 2996-2998. doi: 10.3724/SP.J.1146.2007.00873

A Broadcast Encryption Scheme Based on the Interpolating Polynomial

doi: 10.3724/SP.J.1146.2007.00873
  • Received Date: 2007-06-04
  • Rev Recd Date: 2007-12-24
  • Publish Date: 2008-12-19
  • A broadcast encryption scheme based on the interpolating polynomial is proposed. It allows the sender to designate multi-receivers to the Authority Center (AC). The interpolating polynomial is constructed and the related information is proclaimed by AC. The interpolating polynomial can be reconstructed by computing the central point of line segment to achieve the purpose of broadcasting safely by the legal users using their secret information and the public information published by AC.
  • loading
  • [1] Fiat A and Naor M. Broadcase Encryption. Stinson DR.Advances in Cryptology Crypto 93, Springer-Verlag, 1993:480-491. [2] 屈劲, 葛建华, 蒋铭. 加密广播的密钥分发. 西安电子科技大学学报, 2002, 29(3): 310-323. [3] Boneh Dan and Gentry Craig. Collusion resistant broadcastencryption with short ciphertexts and private keys. Lecturenotes in computer science, Springer, 2005: 258-275. [4] Attrapadung Nuttapong, Furukawa Jun, and Imai Hideki.Forward-secure and searchable broadcast encryption withshort ciphertexts and private keys. ASIACRYPT2006. LNCS ,2006, Vol. 4284: 161-177. [5] Chang C C and Wu T C. Broadcast cryptosystem incomputer networks using interpolating polynomials[J].Computer System Science Enginnering.1991, 6(3):185-188 [6] Wang Xu-zheng and Lin Ya-qi. A Scheme of Fast KeyRecovery on Broadcast Network upon on the Three-centerlocationof a Triangle. Proceedings of 2000 Workshop oninternet Distributed Systems at MCKU, 2000. 10. [7] 陈昭智, 郑建德. 一种基于身份分层结构加密算法的广播加密方案. 厦门大学学报, 2006, 45(3): 342-346. [8] 谭作文, 刘卓军, 肖红光. 一个安全公钥广播加密方案. 软件学报, 2005, 16(7): 1333-1343. [9] Lin J F and Chen S J. Comment on broadcastingcryptosystem in computer networks using interpolatingpolynomials[J].Computer Systems Science Engineering.1996,11(5):315-317 [10] Shamir A. How to share a secret. Communications of theACM, 1979, 22(4): 612-613.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3070) PDF downloads(924) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return