How to securely broadcast a secret

被引:0
|
作者
Schwenk, J [1 ]
机构
[1] Deutsche Telekom AG, Technol Zentrum, D-64295 Darmstadt, Germany
关键词
conference key distribution; one-way function; chosen plaintext attack; subliminal channel; broadcast channel;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The conference key distribution problem over a broadcast channel, i.e. distribution of a key to a set of recipients by a central authority, can be solved by true broadcasting using threshold schemes. This paper gives a security analysis of this approach. After describing succesful attacks on two special implementations of true broadcasting schemes, a slightly different scheme is shown to be provably secure under some well-known cryptographic assumptions. As an application of the threshold scheme approach, a subliminal channel free scheme is given which can be used e.g, in Pay-TV systems.
引用
收藏
页码:247 / 257
页数:11
相关论文
共 50 条
  • [1] HOW TO BROADCAST A SECRET
    BERKOVITS, S
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 535 - 541
  • [2] How to Speak an Authentication Secret Securely from an Eavesdropper
    O'Gorman, Lawrence
    Brotman, Lynne
    Sammon, Michael
    [J]. SECURITY PROTOCOLS, 2009, 5087 : 215 - 229
  • [3] Multiwavelength securely-authenticated broadcast network
    Nishikido, J
    Hiramatsu, A
    Ogawara, M
    Tsukada, M
    Yukimatsu, K
    [J]. IOOC-ECOC 97 - 11TH INTERNATIONAL CONFERENCE ON INTEGRATED OPTICS AND OPTICAL FIBRE COMMUNICATIONS / 23RD EUROPEAN CONFERENCE ON OPTICAL COMMUNICATIONS, VOL 4, 1997, (448): : 17 - 20
  • [4] HOW TO SECURELY REPLICATE SERVICES
    REITER, MK
    BIRMAN, KP
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1994, 16 (03): : 986 - 1009
  • [5] How to transform a business securely
    Ramachandran, Shivakumar
    [J]. ITNOW, 2019, 61 (02) : 18 - 19
  • [6] How to securely outsource cryptographic computations
    Hohenberger, S
    Lysyanskaya, A
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 264 - 282
  • [7] BROADCAST YOURSELF SECURELY: ENHANCED TRANSMISSION SCHEME FOR SHARING DIGITAL CREATIONS
    Lin, Ren-Hung
    Jan, Jinn-Ke
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (05): : 1379 - 1394
  • [8] HOW SECRET IS SECRET
    HAWKER, P
    [J]. ELECTRONICS & WIRELESS WORLD, 1988, 94 (1633): : 1135 - 1135
  • [9] Cooperative Broadcast Channels with a Secret Message
    Goldfeld, Ziv
    Kramer, Gerhard
    Permuter, Haim H.
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1342 - 1346
  • [10] Efficient Secret Broadcast in the Broadcasting Networks
    Jeong, Ik Rae
    Kwon, Jeong Ok
    Lee, Dong Hoon
    [J]. IEEE COMMUNICATIONS LETTERS, 2009, 13 (12) : 1001 - 1003