Lecture Notes in Computer Science
DOI: 10.1007/3-540-48329-2_40
|View full text |Cite
|
Sign up to set email alerts
|

Broadcast Encryption

Abstract: Abstract. We introduce new theoretical measures for the qualitative and quantitative assessment of encryption schemes designed for broadcast transmissions. The goal is to allow a central broadcast site to broadcast secure transmissions to an arbitrary set of recipients while minimizing key management related transmissions. We present several schemes that allow a center to broadcast a secret to any subset of privileged users out of a universe of size n so that coalitions of k users not in the privileged set can… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

2
640
1
1

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 893 publications
(644 citation statements)
references
References 9 publications
2
640
1
1
Order By: Relevance
“…Such a scheme is motivated largely by pay-TV systems, the distribution of copyrighted materials such as CD/DVD. Broadcast encryption schemes were first formalized by Fiat and Naor [13]. Since then, many variants of the basic problem were proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Such a scheme is motivated largely by pay-TV systems, the distribution of copyrighted materials such as CD/DVD. Broadcast encryption schemes were first formalized by Fiat and Naor [13]. Since then, many variants of the basic problem were proposed.…”
Section: Introductionmentioning
confidence: 99%
“…The two major works on blacklisting problems that have appeared in the literature have been the relatively early work of Fiat and Naor [13] and the more recent work of Wallner et. al.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, [27] uses a simple balanced binary tree based scheme. By using such a large number of decryption keys, both [13] and [27] are in fact able to achieve stronger properties, for example the scheme of [27] can allow the number of excluded users k to be arbitrary, rather than fixed in advance. To deal with this structural problem of needing so many decryption keys, for the special case of private-key based broadcast, [13], and to some extent work following [27] by Canetti et.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This makes it necessary to deliver a decryption key to a potentially large number of receivers. Solutions for multicast key management and distribution such as GKMP [1] [2], SKMD [3], lOLUS [4], Broadcast Encryption [5] and SIM-KM [6] [7] have been proposed.…”
Section: Introductionmentioning
confidence: 99%