Optimal subset-difference broadcast encryption with free riders☆
نویسندگان
چکیده
منابع مشابه
Optimal subset-difference broadcast encryption with free riders
Broadcast encryption (BE) deals with secure transmission of a message to a group of receivers such that only an authorized subset of receivers can decrypt the message. The transmission cost of a BE system can be reduced considerably if a limited number of free riders can be tolerated in the system. In this paper, we study the problem of how to optimally place a given number of free riders in a ...
متن کاملBroadcast Encryption with Free-Riders and Unconditional Security
We propose two schemes for efficient broadcast key establishment that enables a sender to communicate to any subset of the user-base by allowing a small ratio of free-riders. The schemes do not require stateful receivers and one scheme is unconditionally secure. The free-riders are unable to learn from the past whether they might become free-riders for a certain transmission again. We present a...
متن کامل2-Subset Difference Scheme for Broadcast Encryption
Abstract. Broadcast Encryption allows a center to broadcast encrypted messages to a set of users so that only privileged users can decrypt them. In this paper, we propose an efficient broadcast encryption scheme based on the “Subset Difference” (SD) scheme. It reduces the transmission overhead by 50 percent while the storage overhead remains the same but the computational overhead somewhat incr...
متن کاملA Broadcast Encryption Scheme with Free-Riders but Unconditional Security
We propose two schemes for efficient broadcast key establishment that enables a sender to communicate to any subset of the user-base by allowing a small ratio of free-riders. The schemes do not require stateful receivers and one scheme is unconditionally secure. The free-riders are unable to learn from the past whether they might become free-riders for a certain transmission again. We present a...
متن کاملAn Optimal Subset Cover for Broadcast Encryption
In broadcast networks, it is often required to encrypt data so that only a privileged set of users with access to the session key can access the data. The standard technique of transferring the session key to each user individually does not scale with the number of users typically found on a network such as cable. This method is not only time-wise inefficient, but also incurs high communication...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Sciences
سال: 2009
ISSN: 0020-0255
DOI: 10.1016/j.ins.2009.05.025