Broadcast Encryption

نویسنده

  • Krishnaram Kenthapadi
چکیده

Our system consists of a center and a set, U of n users. The center provides keys to the users when they join the system. Later on, the center wants to broadcast an encrypted message (such as the password to view “Matrix”) which can be deciphered only by a dynamically changing privileged subset of users, T , i.e., the non-privileged users should not be able to learn the message. To achieve this, the members of T should be able to agree on a common secret key, based only on the keys present with each member and the broadcasts of the center. One approach is for the center to give every user a key and broadcast an individually encrypted message |T | times corresponding to each privileged user. Another approach is to provide every possible subset of users with a key (give each user the keys corresponding to the subsets it belongs to). The former requires a very long transmission whereas the latter requires each user to store exponentially many keys. Fiat and Naor [1] describe schemes that are efficient in both these measures and are also computationally efficient. A broadcast scheme is resilient to a set of users S if for every subset T that is disjoint from S, no eavesdropper that has all the secrets of S, can obtain “knowledge” about the secret common to T . We could either consider the information-theoretic or the computational definition of security. The scheme is k − resilient if it is resilient to any set S ⊂ U of size k.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

Half-Broadcast Encryption for Anonymity

Broadcast Encryption(BE) have been widely used to pay TV, distributed systems and others. In general concept of this encryption, most BE schemes have to broadcast all packets to all network because of intermediate nodes cannot know accurate nodes needing broadcasted packets due to encryption. In this paper, we propose Half-Broadcast Encryption(HBE). Recently, a number of distributed systems hav...

متن کامل

Broadcast Encryption

Broadcast encryption is an interesting application of cryptography which allows one to broadcast a secret to a changing group of intended recipients in such a way that no one outside this group can view the secret. Interest in using broadcast encryption techniques has grown considerably in recent years and such techniques have been integrated in many applications and technologies such as virtua...

متن کامل

Forward-Secure Identity-based Broadcast Encryption Scheme from Lattice

Motivated by an identity-based broadcast encryption scheme from lattice[1] and a forward-secure identity-based encryption scheme[2], we propose a forward-secure identity-based broadcast encryption scheme from lattice by adding the forward-security mechanism on broadcast encryption scheme. Our scheme satisfies the security requirements of both the broadcast encryption scheme and forward-security...

متن کامل

Combinatorial Bounds for Broadcast Encryption

A broadcast encryption system allows a center to communicate securely over a broadcast channel with selected sets of users. Each time the set of privileged users changes, the center enacts a protocol to establish a new broadcast key that only the privileged users can obtain, and subsequent transmissions by the center are encrypted using the new broadcast key. We study the inherent trade-off bet...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003