Linear broadcast encryption schemes

被引:12
作者
Padró, C [1 ]
Gracia, I [1 ]
Martín, S [1 ]
Morillo, P [1 ]
机构
[1] Univ Politecn Catalunya, Dept Matemat Aplicada 4, ES-08034 Barcelona, Spain
关键词
distributed cryptography; key distribution; broadcast encryption; key predistribution schemes;
D O I
10.1016/S0166-218X(02)00447-X
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A new family of broadcast encryption schemes, which will be called linear broadcast encryption schemes (LBESs), is presented in this paper by using linear algebraic techniques. This family generalizes most previous proposals and provides a general framework to the study of broadcast encryption schemes. We present a method to construct, for a general specification structure, LBESs with a good trade-off between the amount of secret information stored by every user and the length of the broadcast message. In this way, we are able to find schemes that fit in situations that have not been considered before. (C) 2003 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:223 / 238
页数:16
相关论文
共 50 条
  • [21] Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption
    Malluhi, Qutaibah
    Vinh Duc Tran
    Viet Cuong Trinh
    SYMMETRY-BASEL, 2020, 12 (06):
  • [22] Analysis of broadcast schemes that implement identity-based encryption algorithms
    Kulakov A.N.
    Aleksandrova E.B.
    Autom. Control Comput. Sci., 8 (790-797): : 790 - 797
  • [23] Reducing receiver's storage in CS, SD and LSD broadcast encryption schemes
    Asano, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01): : 203 - 210
  • [24] Further analysis of pairing-based traitor tracing schemes for broadcast encryption
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 28 - 32
  • [25] Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution
    Blundo, C
    Mattos, LAF
    Stinson, DR
    THEORETICAL COMPUTER SCIENCE, 1998, 200 (1-2) : 313 - 334
  • [26] Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes
    Sun J.
    Hu Y.
    Sun, Jin (oksunjin@xaut.edu.cn), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (08): : 405 - 419
  • [27] Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage
    Watanabe, Yohei
    Shikata, Junji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (06): : 1097 - 1106
  • [28] Broadcast encryption with dealership
    Gritti, Clementine
    Susilo, Willy
    Plantard, Thomas
    Liang, Kaitai
    Wong, Duncan S.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (03) : 271 - 283
  • [29] Towards Trusted Broadcast Encryption
    Cesena, Emanuele
    Ramunno, Gianluca
    Vernizzi, Davide
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2125 - +
  • [30] Broadcast Searchable Keyword Encryption
    Ali, Mohamed Ali Hamza
    Zhong, Ting
    Li, Fagen
    Qin, Zhiguan
    Abdelrahaman, Ahmed A. A.
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1010 - 1016