K-ABC definition
Examples of K-ABC in a sentence
Buyer shall have obtained ----------------------- authorization, on terms reasonable and customary in the industry for cable system operators and broadcast stations of similar size, to carry KCBS, KNBC, KABC, KTTV, KTLA and KCOP on the System from and after Closing.
The new member can also compute the new public group key after getting an updated key tree but he cannot compute the previous group key KABC or KAB because he does not know each user’s private key.
After receiving message (2), entity C is able to calculate the session key KABC = eˆ(P, P )abc.
For short, this section gives an example of user A that is the group member wants to decrypt the message as the following; mD = m′ H (R KABC PKD (KABC)-1 ) mD = m′ H (R ((a PKB a -1)PKC (a PKB a -1) -1) PKD ((a PKB a -1) PKC (aPKB a -1 ) -1 )-1 ) From the above example, user A can use his private key a in the term KABC and (KABC)-1 as in the user A’s view as mentioned in the previous subsection.
Decryption: mD = m′ H (R KABC PKD (KABC)-1 ) In the above, the H: Bn → {0, 1}M is a collision-free hash function.
The director can compute a new group key KABCD = KABC PKD KABC -1and a new public group key PKABCD.
More properly, encryptions should use a key derived from KABC rather than KABC itself.
The specific statement of work will provide the detailed arrangements for the Services to be rendered thereunder and will be established in accordance with the Annex.
This section shows the correctness of the proposed algorithms as the following; Theorem: ab = ba where a ∈ Bg1, and b ∈ Bg2 mD = m′ H (R KABC PKD (KABC)-1 ) = m′ H (R KABC d gAgBgC d -1 (KABC)-1) = m′ H (R d KABC gAgBgC (KABC)-1 d-1) = m′ H (R d PKABC d -1) As examples shown above, any user which is not the group member cannot decrypt the ciphertext because he does not know the value of KABC.
As before, EK (·) donates symmetric encryption under session key KABC, and as before SA(·) denotes A’s signature.