Method of managing user key for broadcast encryption
First Claim
1. A method of managing a user key for a broadcast encryption, the method comprising:
- assigning node path identifiers (IDs) to nodes which are arranged in sequence;
assigning random seed value keys to the nodes according to the node path IDs;
generating key values by repeatedly applying a hash function to the assigned random seed value keys; and
assigning the generated key values to the nodes in sequence.
1 Assignment
0 Petitions
Accused Products
Abstract
A user key management method for a broadcast encryption includes assigning node path identifiers (IDs) to nodes arranged in sequence; assigning random seed value keys to the nodes according to the node path IDs; generating key values by repeatedly applying a hash function to the assigned random seed value keys; and assigning the generated key values to the nodes in sequence. Accordingly, it is possible to reduce the transmission overhead that is most important matter in the broadcast encryption to less than the number of the revoked users. Further, there is an advantage that the transmission overhead of the exemplary embodiments of the present invention is remarkably reduced compared with the Subset Difference method.
-
Citations
23 Claims
-
1. A method of managing a user key for a broadcast encryption, the method comprising:
-
assigning node path identifiers (IDs) to nodes which are arranged in sequence;
assigning random seed value keys to the nodes according to the node path IDs;
generating key values by repeatedly applying a hash function to the assigned random seed value keys; and
assigning the generated key values to the nodes in sequence. - View Dependent Claims (2, 3, 4)
-
-
5. A method of managing a user key for a broadcast encryption, the method comprising:
-
assigning random seed value keys to nodes which are sequentially arranged;
generating first key values by repeatedly applying a first hash function to the assigned random seed value keys;
assigning the first key values to the nodes in sequence;
setting special nodes in a certain interval among the nodes which are sequentially arranged;
assigning special seed value keys to the special nodes;
generating second key values by repeatedly applying a second hash function to the assigned special seed value keys; and
assigning the second key values to the special nodes in sequence. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method of managing a user key for a broadcast encryption, the method comprising:
-
assigning node path identifiers (IDs) to nodes configured as a circular group;
assigning random seed value keys to the nodes according to the node path IDs;
generating key values by repeatedly applying a hash function to the assigned random seed value keys; and
assigning the generated key values to the nodes in a cyclic way. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of managing a user key for a broadcast encryption, the method comprising:
-
assigning random seed value keys to nodes configured as a circular group;
generating first key values by repeatedly applying a first hash function to the assigned random seed value keys;
assigning the first key values to the nodes in a cyclic way;
setting special nodes in a certain interval among the nodes;
assigning random special seed value keys to the special nodes;
generating second key values by repeatedly applying a second hash function to the assigned random seed value keys; and
assigning the second key values to the special nodes in a cyclic way. - View Dependent Claims (20, 21, 22, 23)
-
Specification