Broadcast encryption schemes based on the sectioned key tree

被引:0
|
作者
Mihaljevic, MJ [1 ]
机构
[1] Serbian Acad Arts & Sci, Inst Math, YU-11001 Belgrade, Serbia Monteneg, Yugoslavia
关键词
broadcast encryption; key management; stateless receivers;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a family of key management schemes for stateless receivers, and particularly two of the family members called SKT-A and SKT-B. A basic strategy of the proposed approach could be formulated as follows: Before dealing with the set covering issues, perform an appropriate preprocessing over the underlying tree in order to specify a more suitable underlying structure for the set covering. The main underlying idea for developing a novel family of the key management schemes is employment of appropriate clustering of the keys and users, and employment heterogeneous cluster oriented local key management. The proposed schemes are compared with the recently reported, and the advantages of the novel ones are pointed out.
引用
收藏
页码:158 / 169
页数:12
相关论文
共 50 条
  • [41] IDENTIFY-BASED CONFERENCE KEY BROADCAST SCHEMES WITH USER AUTHENTICATION
    CHEN, JL
    HWANG, T
    [J]. COMPUTERS & SECURITY, 1994, 13 (01) : 53 - 57
  • [42] Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    Sakurai, Kouichi
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2012, 314 : 233 - +
  • [43] Broadcast encryption using identity-based public-key cryptosystem
    Lv, XX
    Yang, B
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 1092 - 1097
  • [44] A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption
    Canard, Sebastien
    Phan, Duong Hieu
    Viet Cuong Trinh
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 594 - 603
  • [45] KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
    Liu, Ling
    Zhang, Yuqing
    Li, Xuejun
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (02) : 670 - 681
  • [46] Broadcast-Enhanced Key Predistribution Schemes
    Kendall, Michelle
    Martin, Keith M.
    Ng, Siaw-Lynn
    Paterson, Maura B.
    Stinson, Douglas R.
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2014, 11 (01)
  • [47] Quantum public-key encryption schemes based on conjugate coding
    Yang, Li
    Yang, Biyao
    Xiang, Chong
    [J]. QUANTUM INFORMATION PROCESSING, 2020, 19 (11)
  • [48] Dealerless Corporate Key Generation for Identity-Based Encryption Schemes
    Liu, Zhen
    Wong, Duncan S.
    Poon, Jack
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 211 - 222
  • [49] Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory
    Garg, Rachit
    Lu, George
    Waters, Brent
    Wu, David J.
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1093 - 1107
  • [50] Quantum public-key encryption schemes based on conjugate coding
    Li Yang
    Biyao Yang
    Chong Xiang
    [J]. Quantum Information Processing, 2020, 19