Improving the trade-off between storage and communication in broadcast encryption schemes

نویسندگان

  • Carles Padró
  • Ignacio Gracia
  • Sebastià Martín Molleví
چکیده

The most important point in the design of broadcast encryption schemes (BESs) is obtain a good trade-o between the amount of secret information that must be stored by every user and the length of the broadcast message, which are measured, respectively, by the information rate and the broadcast information rate B. In this paper we present a simple method to combine two given BESs in order to improve the trade-o between and B by nding BESs with good information rate for arbitrarily many di erent values of the broadcast information rate B. We apply this technique to threshold (R;T )-BESs and we present a method to obtain, for every rational value 1=R B 1, a (R; T )-BES with optimal information rate among all (R; T )-BESs that can be obtained by combining two of the (R;T )-BESs proposed by Blundo et al. [7].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution

In 1993, Beimel and Chor presented an unconditionally secure interactive protocol which allows a subset of users in a network to establish a common key. This scheme made use of a key predistribution scheme due to Blom. In this paper, we describe some variations and generalizations of the Beimel-Chor scheme, including broadcast encryption schemes as well as interactive key distribution schemes. ...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

One-Way Chain Based Broadcast Encryption Schemes

We propose a new broadcast encryption scheme based on the idea of ‘one key per each punctured interval’. Let r be the number of revoked users. In our scheme with p-punctured c-intervals, the transmission overhead is roughly r p+1 as r grows. Our scheme is very flexible with two parameters p and c. We may take p as large as possible if a user device allows a large key storage, and set c as small...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Discrete Applied Mathematics

دوره 143  شماره 

صفحات  -

تاریخ انتشار 2001