摘要:
A digital rights management (DRM) function performing method and system using a DRM device are provided, in which a DRM device connected to a second communication device decodes encoded contents when a first communication device requests to play the contents, the DRM device re-encodes the contents using a session key, and the DRM device transmits the re-encoded contents to the first communication device via the second communication device.
摘要:
A broadcast encryption method and a broadcast decryption method. The broadcast encryption method includes generating a message encryption key using a public key and a secret key generated by using a Strong Diffie-Hellman tuple; encrypting a message by the message encryption key; and generating a message header using a sum of a plurality of Strong Diffie-Hellman tuples corresponding to an authorized user group. Accordingly, a transmission amount and a storage amount can be reduced when a broadcast encryption message is transmitted.
摘要:
A successive data processing method and apparatus is provided. A data processing apparatus, when connected to a data management apparatus, transmits apparatus information of the data processing apparatus, selects target process data, transmits target process information of the selected target process data, processes the target process data, and transmits process status information according to a process result of the target process data to the data management apparatus.
摘要:
A radio frequency identification (RFID) tag encryption method and system using a broadcast encryption (BE) scheme are provided by encrypting an ID of an RFID tag, storing the encrypted ID in a server and the RFID tag, and storing information relating to a reader authorized to read out the RFID tag in the server so that the reader can read out the RFID tag by decrypting the encrypted ID based on the encrypted ID information read from the RFID tag and the reader information. When readers read out ID data from the RFID tag, a privileged reader can read the data. Thus, it is possible to block unintended information leakage to the readers. In addition, user usability can be enhanced since an attacker cannot perform an access lock on the RFID tag.
摘要:
A method of managing a user key for a broadcast encryption. The method includes assigning numbers to respective users and arranging the users on a ring-shaped structure in order to map hash chains onto the respective nodes of a ring-shaped structure. The method further includes making random node keys correspond to the respective nodes, one by one, constructing the hash chains from the corresponding node keys using a hash function, and successively mapping the constructed hash chains onto the nodes of the ring-shaped structure.
摘要:
An apparatus and method for generating a key for a broadcast encryption. The apparatus includes a node secret generator for managing a user that receives broadcast data in a tree structure and for generating a unique node secret for each node in the tree structure. The apparatus also includes an instant key generator for temporarily generating an instant key used at all nodes in common in the tree structure, and a node key generator for generating a node key for each node by operating the node secret generated at the node secret generator and the instant key generated at the instant key generator. Thus, key update can be efficiently achieved.
摘要:
A method of obtaining C=(c0, . . . , cn-1) of a product of two elements A and B of a finite field GF(2n). The method includes permuting the last d coefficients (an-1, . . . , an-d) of a multiplier A with predetermined variables (sn-1, . . . , sn-d); operating C:C=⊕(bi+j●A) for (I+j)th coefficient of a multiplicand B to update coefficients of C, where i and j are integers, and A:=(sn-1-j,α0, . . . ,αn-2)⊕(0,sn-1-j●f1, . . . ,sn-1-j●fn-d,0, . . . ,0) repeatedly for j=0 to (d−1) to update coefficients of A, where ⊕ represents an XOR operation and ● represents an AND operation; and repeatedly performing the permuting and operating by increasing i from 0 to (n-1) by d.
摘要:
A security system using an RSA algorithm that includes a key input section for receiving a secret key and a public key used in one of encryption and decryption of a message, a random coefficient generating section for generating a random coefficient r having a bit of a predetermined size, a first calculation section for dividing the secret key into a first secret key and a second secret key by using the value of r, and performing an exponentiation of RSA algorithm by using the respective secret keys and the public key, and a second calculation section for performing one of the encryption and the decryption by combining results of exponentiation calculated respectively by using the first and the second secret keys.
摘要:
An apparatus and method for generating a key for a broadcast encryption. The apparatus includes a node secret generator for managing a user that receives broadcast data in a tree structure and for generating a unique node secret for each node in the tree structure. The apparatus also includes an instant key generator for temporarily generating an instant key used at all nodes in common in the tree structure, and a node key generator for generating a node key for each node by operating the node secret generated at the node secret generator and the instant key generated at the instant key generator. Thus, key update can be efficiently achieved.
摘要:
A broadcast encryption method and a broadcast decryption method. The broadcast encryption method includes generating a message encryption key using a public key and a secret key generated by using a Strong Diffie-Hellman tuple; encrypting a message by the message encryption key; and generating a message header using a sum of a plurality of Strong Diffie-Hellman tuples corresponding to an authorized user group. Accordingly, a transmission amount and a storage amount can be reduced when a broadcast encryption message is transmitted.