Linear broadcast encryption schemes

被引:12
作者
Padró, C [1 ]
Gracia, I [1 ]
Martín, S [1 ]
Morillo, P [1 ]
机构
[1] Univ Politecn Catalunya, Dept Matemat Aplicada 4, ES-08034 Barcelona, Spain
关键词
distributed cryptography; key distribution; broadcast encryption; key predistribution schemes;
D O I
10.1016/S0166-218X(02)00447-X
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A new family of broadcast encryption schemes, which will be called linear broadcast encryption schemes (LBESs), is presented in this paper by using linear algebraic techniques. This family generalizes most previous proposals and provides a general framework to the study of broadcast encryption schemes. We present a method to construct, for a general specification structure, LBESs with a good trade-off between the amount of secret information stored by every user and the length of the broadcast message. In this way, we are able to find schemes that fit in situations that have not been considered before. (C) 2003 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:223 / 238
页数:16
相关论文
共 50 条
[21]   On the mean number of encryptions for tree-based broadcast encryption schemes [J].
Park, E. C. ;
Blake, I. F. .
JOURNAL OF DISCRETE ALGORITHMS, 2006, 4 (02) :215-238
[22]   Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes [J].
Mihaljevic, Miodrag J. ;
Fossorier, Marc P. C. ;
Imai, Hideki .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (06) :1248-1251
[23]   Reducing receiver's storage in CS, SD and LSD broadcast encryption schemes [J].
Asano, T .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) :203-210
[24]   Further analysis of pairing-based traitor tracing schemes for broadcast encryption [J].
Wu, Tsu-Yang ;
Tseng, Yuh-Min .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) :28-32
[25]   Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution [J].
Blundo, C ;
Mattos, LAF ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 1998, 200 (1-2) :313-334
[26]   Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes [J].
Sun J. ;
Hu Y. .
International Journal of Information and Communication Technology, 2016, 8 (04) :405-419
[27]   Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage [J].
Watanabe, Yohei ;
Shikata, Junji .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (06) :1097-1106
[28]   Broadcast encryption with dealership [J].
Gritti, Clementine ;
Susilo, Willy ;
Plantard, Thomas ;
Liang, Kaitai ;
Wong, Duncan S. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (03) :271-283
[29]   Towards Trusted Broadcast Encryption [J].
Cesena, Emanuele ;
Ramunno, Gianluca ;
Vernizzi, Davide .
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, :2125-+
[30]   Ad Hoc Broadcast Encryption [J].
Wu, Qianhong ;
Qin, Bo ;
Zhang, Lei ;
Domingo-Ferrer, Josep .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :741-743