A New Type of ID-based Encryption System and Its Application to Pay-TV Systems

نویسندگان

  • Xingwen Zhao
  • Fangguo Zhang
چکیده

We proposed a new type of ID-based encryption scheme. Our scheme is different from other schemes on that we use tamper resistant smart card to store the private key and do the decryption job for the users. The user knows nothing about the private key. Our scheme is identical to ElGamal encryption scheme, but using RSA framework to avoid ID replacement attack. In a way, our scheme can be regarded as new application for the widely deployed RSA system. By employing the skill introduced by Dodis and Fazio for converting symmetric broadcast encryption schemes into public key ones, we extend our scheme into an efficient broadcast encryption scheme and apply it to the pay-TV system. We show that our broadcast encryption scheme is efficient in some aspects. For example, public keys of our system are of the size O(1) and decryption cost for each receiver is one modular exponentiation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Method for Encryption of Color Images based on Combination of Chaotic Systems

This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...

متن کامل

Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption

In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...

متن کامل

Privacy-preserving multireceiver ID-based encryption with provable security

Multireceiver identity (ID) based encryption and ID-based broadcast encryption allow a sender to use the public identities of multiple receivers to encrypt messages so that only the selected receivers or a privileged set of users can decrypt the messages. It can be used for many practical applications such as digital content distribution, pay-per-view and multicast communication. For protecting...

متن کامل

A fuzzy reasoning method based on compensating operation and its application to fuzzy systems

In this paper, we present a new fuzzy reasoning method based on the compensating fuzzy reasoning (CFR). Its basicidea is to obtain a new fuzzy reasoning result by moving and deforming the consequent fuzzy set on the basis of themoving, deformation, and moving-deformation operations between the antecedent fuzzy set and observation information.Experimental results on real-world data sets show tha...

متن کامل

A new key establishment protocol and its application in pay-TV systems

A pay-TV consumer uses a decoder to access encrypted digital content. To this end, a decoder contains a chip capable of decrypting the content. The recently standardized K-LAD key establishment protocol can be used to secure the delivery of content decryption keys to the chip. This paper presents a new key establishment protocol. The paper shows how the new protocol can be applied in a pay-TV s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2011