Sequential key derivation patterns for broadcast encryption and key predistribution schemes

被引:0
|
作者
Attrapadung, N [1 ]
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Imai Lab, Meguro Ku, Tokyo 1538505, Japan
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). Broadcast Encryption allows a broadcaster to broadcast an encrypted message so that only a designated group of users can decrypt it. KPS allows a designated group of users to establish a common key non-interactively. We discover a generic method to construct efficient broadcast encryption schemes and KPSs naturally from Pseudo-Random Sequence Generators (PRSG) by observing that there axe general "patterns" to do so. The two currently best PRSG-based broadcast encryption schemes such as the "Subset Difference" (SD) scheme by Naor Naor and Lotspiech and its refinement, the "Layered SD" (LSD) scheme by Halevy and Shamir, are indeed two special cases of our method. We demonstrate the power of this generic method by giving: (1) A solution to the most challenging variant of KPS: the one which supports arbitrary number of users to form a group yet secure against any collusion. We obtain-a lower bound of the private key size at each user for any PRSG-based KPSs in this setting and construct a KPS that meets this bound. (2) An evidence that previous PRSG-based BE schemes, such as SD and LSD, can be further improved without any further assumption using this general method. We construct "Flexible SM and "Flexible LSD" broadcast encryption schemes, which require less private key size while still maintain exactly the same broadcast size compared to their original SD/LSD schemes.
引用
收藏
页码:374 / 391
页数:18
相关论文
共 50 条
  • [1] Broadcast-Enhanced Key Predistribution Schemes
    Kendall, Michelle
    Martin, Keith M.
    Ng, Siaw-Lynn
    Paterson, Maura B.
    Stinson, Douglas R.
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2014, 11 (01)
  • [2] Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes
    Chen, Hao
    Ling, San
    Padro, Carles
    Wang, Huaxiong
    Xing, Chaoping
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2009, 5921 : 263 - +
  • [3] Key preassigned traceability schemes for broadcast encryption
    Stinson, DR
    Wei, R
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 144 - 156
  • [4] Linear Key Predistribution Schemes
    Carles Padró
    Ignacio Gracia
    Sebastià Martín Molleví
    Paz Morillo
    [J]. Designs, Codes and Cryptography, 2002, 25 : 281 - 298
  • [5] Linear key predistribution schemes
    Padró, C
    Gracia, I
    Molleví, SM
    Morillo, P
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (03) : 281 - 298
  • [6] Broadcast encryption schemes based on the sectioned key tree
    Mihaljevic, MJ
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 158 - 169
  • [7] Public key broadcast encryption schemes with shorter transmissions
    Park, Jong Hwan
    Kim, Hee Jean
    Sung, Maeng Hee
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON BROADCASTING, 2008, 54 (03) : 401 - 411
  • [8] On broadcast encryption with random key pre-distribution schemes
    Ramkumar, M
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 304 - 316
  • [9] Key establishment algorithms for some deterministic key predistribution schemes
    Ruj, Sushmita
    Roy, Birnal
    [J]. WOSIS 2008: SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2008, : 68 - 77
  • [10] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213