Sequential key derivation patterns for broadcast encryption and key predistribution schemes

被引:0
|
作者
Attrapadung, N [1 ]
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Imai Lab, Meguro Ku, Tokyo 1538505, Japan
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003 | 2003年 / 2894卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). Broadcast Encryption allows a broadcaster to broadcast an encrypted message so that only a designated group of users can decrypt it. KPS allows a designated group of users to establish a common key non-interactively. We discover a generic method to construct efficient broadcast encryption schemes and KPSs naturally from Pseudo-Random Sequence Generators (PRSG) by observing that there axe general "patterns" to do so. The two currently best PRSG-based broadcast encryption schemes such as the "Subset Difference" (SD) scheme by Naor Naor and Lotspiech and its refinement, the "Layered SD" (LSD) scheme by Halevy and Shamir, are indeed two special cases of our method. We demonstrate the power of this generic method by giving: (1) A solution to the most challenging variant of KPS: the one which supports arbitrary number of users to form a group yet secure against any collusion. We obtain-a lower bound of the private key size at each user for any PRSG-based KPSs in this setting and construct a KPS that meets this bound. (2) An evidence that previous PRSG-based BE schemes, such as SD and LSD, can be further improved without any further assumption using this general method. We construct "Flexible SM and "Flexible LSD" broadcast encryption schemes, which require less private key size while still maintain exactly the same broadcast size compared to their original SD/LSD schemes.
引用
收藏
页码:374 / 391
页数:18
相关论文
共 50 条
  • [31] Key predistribution schemes for sensor networks for continuous deployment scenario
    Uenlue, Abduelhakim
    Armagan, Oensel
    Levi, Albert
    Savas, Erkay
    Ercetin, Oergur
    NETWORKING 2007: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2007, 4479 : 239 - +
  • [33] Key Predistribution Schemes Using Codes in Wireless Sensor Networks
    Ruj, Sushmita
    Roy, Bimal
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 275 - 288
  • [34] New Combinatorial Bounds for Authentication Codes and Key Predistribution Schemes
    Kurosawa K.
    Okada K.
    Saido H.
    Stinson D.R.
    Designs, Codes and Cryptography, 1998, 15 (1) : 87 - 100
  • [35] From Key Predistribution to Key Redistribution
    Cichon, Jacek
    Golgbiewski, Zbigniew
    Kutylowski, Miroslaw
    ALGORITHMS FOR SENSOR SYSTEMS, 2010, 6451 : 92 - 104
  • [36] Graph-theoretic design and analysis of key predistribution schemes
    Kendall, Michelle
    Martin, Keith M.
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 81 (01) : 11 - 34
  • [37] CRT-KPS: A Key Predistribution Schemes Using CRT
    Sarkar, Pinaki
    Baranwal, Mayank
    Nandi, Sukumar
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 821 - 830
  • [38] Robust key-evolving public key encryption schemes
    Tzeng, WG
    Tzeng, ZJ
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 61 - 72
  • [39] Public key broadcast encryption for stateless receivers
    Dodis, Y
    Fazio, N
    DIGITAL RIGHTS MANAGEMENT, 2002, 2696 : 61 - 80
  • [40] Tree based symmetric key broadcast encryption
    Bhattacherjee, Sanjay
    Sarkar, Palash
    JOURNAL OF DISCRETE ALGORITHMS, 2015, 34 : 78 - 107