The average transmission overhead for broadcast encryption

被引:0
作者
Aravamuthan, Sarang [1 ]
Lodha, Sachin [2 ]
机构
[1] Google, Hyderabad, Andhra Pradesh, India
[2] Tata Consultancy Serv, Bangalore, Karnataka, India
关键词
Broadcast encryption; Shannon's entropy;
D O I
10.1515/JMC.2007.019
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider broadcast encryption schemes wherein a center needs to broadcast a secret message to a privileged set of receivers. We prescribe a probability distribution P on the privileged set. In this setting, the transmission overhead can be viewed as a random variable over P and we define its expected value as the average transmission overhead (or ATO). Given P, the Shannon's entropy function H(.) provides a lower bound on the average number of bits required to identify every privileged set. This implies a natural lower bound for the ATO in terms of H(P). For session key distribution, we consider the subset cover framework and bound the ATO in terms of the size of the cover. We further specialize our bound to accommodate storage constraints at receivers. We consider two families of distributions for P that occur naturally in broadcast networks. 1. Each receiver independently joins the privileged set with probability p. 2. The privileged set is selected uniformly from a collection of subsets of receivers. We evaluate the ATO of some practical schemes such as the subset difference method, the LSD scheme and the Partition-and-Power scheme under these distributions. Our investigations lead us to conclude that each scheme is inherently tailored to perform optimally for specific distributions.
引用
收藏
页码:373 / 384
页数:12
相关论文
共 16 条
[1]  
Alon N., 2004, PROBABILISTIC METHOD
[2]  
Aravamuthan S, 2005, LECT NOTES COMPUT SC, V3797, P221
[3]  
Berkovits S., 1991, LNCS, P536
[4]  
BLUNDO C, 1996, LNCS, V1109, P387, DOI DOI 10.1007/3-540-68697-5
[5]  
Blundo C., 1994, P WORKSH THEOR APPL, P287
[6]  
CHEON JH, 2005, SKIPPING CASCADE COM
[7]   SECURE BROADCASTING USING THE SECURE LOCK [J].
CHIOU, GH ;
CHEN, WT .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1989, 15 (08) :929-930
[8]  
Daji Qiao, 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P1698, DOI 10.1109/INFCOM.2000.832569
[9]  
Fiat A., 1993, ANN INT CRYPT C, V773, P480, DOI [DOI 10.1007/3-540-48329-240, DOI 10.1007/3-540-48329-2]
[10]  
Halevy D, 2002, LECT NOTES COMPUT SC, V2442, P47