Broadcast encryption schemes based on the sectioned key tree

被引:0
|
作者
Mihaljevic, MJ [1 ]
机构
[1] Serbian Acad Arts & Sci, Inst Math, YU-11001 Belgrade, Serbia Monteneg, Yugoslavia
关键词
broadcast encryption; key management; stateless receivers;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a family of key management schemes for stateless receivers, and particularly two of the family members called SKT-A and SKT-B. A basic strategy of the proposed approach could be formulated as follows: Before dealing with the set covering issues, perform an appropriate preprocessing over the underlying tree in order to specify a more suitable underlying structure for the set covering. The main underlying idea for developing a novel family of the key management schemes is employment of appropriate clustering of the keys and users, and employment heterogeneous cluster oriented local key management. The proposed schemes are compared with the recently reported, and the advantages of the novel ones are pointed out.
引用
收藏
页码:158 / 169
页数:12
相关论文
共 50 条
  • [1] Tree based symmetric key broadcast encryption
    Bhattacherjee, Sanjay
    Sarkar, Palash
    [J]. JOURNAL OF DISCRETE ALGORITHMS, 2015, 34 : 78 - 107
  • [2] Key preassigned traceability schemes for broadcast encryption
    Stinson, DR
    Wei, R
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 144 - 156
  • [3] On the mean number of encryptions for tree-based broadcast encryption schemes
    Park, E. C.
    Blake, I. F.
    [J]. JOURNAL OF DISCRETE ALGORITHMS, 2006, 4 (02) : 215 - 238
  • [4] A lightweight tree based one-key broadcast encryption scheme
    Asano, Tomoyuki
    Kamio, Kazuya
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (07) : 2019 - 2028
  • [5] Public key broadcast encryption schemes with shorter transmissions
    Park, Jong Hwan
    Kim, Hee Jean
    Sung, Maeng Hee
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON BROADCASTING, 2008, 54 (03) : 401 - 411
  • [6] Broadcast encryption schemes based on RSA
    MU, Ning-bo
    HU, Yu-pu
    OU, Hai-wen
    [J]. Journal of China Universities of Posts and Telecommunications, 2009, 16 (01): : 69 - 75
  • [8] Sequential key derivation patterns for broadcast encryption and key predistribution schemes
    Attrapadung, N
    Kobara, K
    Imai, H
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 374 - 391
  • [9] On broadcast encryption with random key pre-distribution schemes
    Ramkumar, M
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 304 - 316
  • [10] Generalized Identity Based and Broadcast Encryption Schemes
    Boneh, Dan
    Hamburg, Michael
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 455 - 470