Linear broadcast encryption schemes

被引:12
|
作者
Padró, C [1 ]
Gracia, I [1 ]
Martín, S [1 ]
Morillo, P [1 ]
机构
[1] Univ Politecn Catalunya, Dept Matemat Aplicada 4, ES-08034 Barcelona, Spain
关键词
distributed cryptography; key distribution; broadcast encryption; key predistribution schemes;
D O I
10.1016/S0166-218X(02)00447-X
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A new family of broadcast encryption schemes, which will be called linear broadcast encryption schemes (LBESs), is presented in this paper by using linear algebraic techniques. This family generalizes most previous proposals and provides a general framework to the study of broadcast encryption schemes. We present a method to construct, for a general specification structure, LBESs with a good trade-off between the amount of secret information stored by every user and the length of the broadcast message. In this way, we are able to find schemes that fit in situations that have not been considered before. (C) 2003 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:223 / 238
页数:16
相关论文
共 50 条
  • [31] New constructions on broadcast encryption and key pre-distribution schemes
    Huang, SCH
    Du, DZ
    IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 515 - 523
  • [32] Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes
    Mihaljevic, Miodrag J.
    Fossorier, Marc P. C.
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (06) : 1248 - 1251
  • [33] Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes
    Chen, Hao
    Ling, San
    Padro, Carles
    Wang, Huaxiong
    Xing, Chaoping
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2009, 5921 : 263 - +
  • [34] Further analysis of pairing-based traitor tracing schemes for broadcast encryption
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 28 - 32
  • [35] Reducing receiver's storage in CS, SD and LSD broadcast encryption schemes
    Asano, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01): : 203 - 210
  • [36] Improving the trade-off between storage and communication in broadcast encryption schemes
    Padró, C
    Gracia, I
    Martín, S
    DISCRETE APPLIED MATHEMATICS, 2004, 143 (1-3) : 213 - 220
  • [37] Secure and efficient public key multi-channel broadcast encryption schemes
    Acharya, Kamalesh
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [38] Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution
    Blundo, C
    Mattos, LAF
    Stinson, DR
    THEORETICAL COMPUTER SCIENCE, 1998, 200 (1-2) : 313 - 334
  • [39] Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework
    Acharya, Kamalesh
    Dutta, Ratna
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 495 - 515
  • [40] Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes
    Sun J.
    Hu Y.
    Sun, Jin (oksunjin@xaut.edu.cn), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (08): : 405 - 419