How to securely broadcast a secret

被引:0
|
作者
Schwenk, J [1 ]
机构
[1] Deutsche Telekom AG, Technol Zentrum, D-64295 Darmstadt, Germany
关键词
conference key distribution; one-way function; chosen plaintext attack; subliminal channel; broadcast channel;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The conference key distribution problem over a broadcast channel, i.e. distribution of a key to a set of recipients by a central authority, can be solved by true broadcasting using threshold schemes. This paper gives a security analysis of this approach. After describing succesful attacks on two special implementations of true broadcasting schemes, a slightly different scheme is shown to be provably secure under some well-known cryptographic assumptions. As an application of the threshold scheme approach, a subliminal channel free scheme is given which can be used e.g, in Pay-TV systems.
引用
收藏
页码:247 / 257
页数:11
相关论文
共 50 条
  • [41] How to Listen to a Foreign Broadcast
    萧坤
    [J]. 语言教育, 1992, (01) : 34 - 36
  • [42] How loud is my broadcast?
    不详
    [J]. JOURNAL OF THE AUDIO ENGINEERING SOCIETY, 2004, 52 (06): : 662 - +
  • [43] Group Secret Key Generation over Broadcast Erasure Channels
    Siavoshani, Mahdi Jafari
    Fragouli, Christina
    Diggavi, Suhas
    Pulleti, Uday
    Argyraki, Katerina
    [J]. 2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR), 2010, : 719 - 723
  • [44] ON THE USE OF SECRET KEYS IN BROADCAST CHANNELS WITH RECEIVER SIDE INFORMATION
    Schaefer, Rafael F.
    Khisti, Ashish
    Boche, Holger
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [45] Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks
    Zhang, Mingwu
    Li, Fagen
    Takagi, Tsuyoshi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (02) : 686 - 689
  • [46] Transmitter Optimization in MISO Broadcast Channel with Common and Secret Messages
    Vishwakarma, Sanjay
    Chockalingam, A.
    [J]. 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 1625 - 1630
  • [47] A prepositioned secret sharing scheme for message authentication in broadcast networks
    Eskicioglu, AM
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY ISSUES OF THE NEW CENTURY, 2001, 64 : 363 - 373
  • [48] A Strong Binding Encryption Scheme from Lattices for Secret Broadcast
    Noh, Geontae
    Hong, Dowon
    Kwon, Jeong Ok
    Jeong, Ik Rae
    [J]. IEEE COMMUNICATIONS LETTERS, 2012, 16 (06) : 781 - 784
  • [49] Securely Attached: How Understanding Childhood Trauma Will Transform Your Parenting
    Reffner, Julia M.
    [J]. LIBRARY JOURNAL, 2020, 145 (09) : 55 - 55
  • [50] How securely is the testicular artery occluded in the spermatic cord by using a ligature?
    Rijkenhuizen, A. B. M.
    Sommerauer, S.
    Fasching, M.
    Velde, K.
    Peham, C.
    [J]. EQUINE VETERINARY JOURNAL, 2013, 45 (05) : 649 - 652