2005
DOI: 10.1007/11535218_17
|View full text |Cite
|
Sign up to set email alerts
|

Generic Transformation for Scalable Broadcast Encryption Schemes

Abstract: Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many communication in broadcasting, transmission length may be of major concern. Several broadcast encryption schemes with good transmission overhead have been proposed. But, these broadcast encryption schemes are not practical since they are greatly sacrificing performance of other efficiency parameters to achieve good performance in transmi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…Broadcast center in private encryption based schemes can know or deduce every user's private key, and all the keys for one user has to be kept in secret memory. Most of the schemes [13] are in private encryption way. As to public encryption based schemes, the broadcast center doesn't need users' private key set, only the public keys can finish the ciphertext generation.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Broadcast center in private encryption based schemes can know or deduce every user's private key, and all the keys for one user has to be kept in secret memory. Most of the schemes [13] are in private encryption way. As to public encryption based schemes, the broadcast center doesn't need users' private key set, only the public keys can finish the ciphertext generation.…”
Section: A Related Workmentioning
confidence: 99%
“…Their subset deduction procedure always can be seen as forming an interval from a line. The chain-based schemes include Skipping/Cascade/Combined chain (SCCC) scheme [12], HLL scheme [13], Log-key [14]scheme and so on.…”
Section: A Related Workmentioning
confidence: 99%
“…Alternatively, we could use a one-to-many or many-to-many stateless broadcast encryption scheme [32,38,27,25], which ensures that re-keying is infrequent and that many possible subsets can be generated with little computational effort. At this point, we did not see any direct advantage of using such approaches over simply deriving the group key for a conversation from the content of the initial Direct Message in that conversation.…”
Section: Protecting Privacymentioning
confidence: 99%
“…We note that a broadcaster possibly sends a message to a huge number of users; hence efficiency in transmission cost has been considered to be a critical measure by service providers. Since Fiat and Naor [1] first formalized broadcast encryption in the symmetric key setting, a large body of work [2]- [8] has been devoted to building efficient broadcast encryption schemes. Until now, the most efficient scheme in the symmetric key setting achieves transmission cost while maintaining user storage cost [4]- [8], where denotes the number of revoked users and denotes the total number of users.…”
Section: Introductionmentioning
confidence: 99%