Public Key Broadcast Encryption for Stateless Receivers
نویسندگان
چکیده
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings for this problem is that of stateless receivers, where each user is given a fixed set of keys which cannot be updated through the lifetime of the system. This setting was considered by Naor, Naor and Lotspiech [17], who also present a very efficient “subset difference” (SD) method for solving this problem. The efficiency of this method was recently improved by Halevi and Shamir [12], who called their refinement the “Layered SD” (LSD) method. Both of the above methods were originally designed to work in the symmetric key setting, where only the trusted designer of the system can encrypt messages to users. On the other hand, in many applications it is desirable not to store the secret keys “on-line”, or to allow untrusted users to broadcast information. This leads to the question of building a public key broadcast encryption scheme for stateless receivers; in particular, of extending the elegant SD/LSD methods to the public key setting. Naor et al. [17] notice that the natural technique for doing so will result in an enormous public key and very large storage for every user. In fact, [17] pose this question of reducing the public key size and user’s storage as the first open problem of their paper. We resolve this question in the affirmative, by demonstrating that an O(1) size public key can be achieved for both of SD/LSD methods, in addition to the same (small) user’s storage and ciphertext size as in the symmetric key setting.
منابع مشابه
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. In our first construction both ciphertexts and private keys are of constant size (only two group elements), for any subset of receivers. The public key size in this system is linear in the total number of receivers. Our second system is a generaliza...
متن کاملAn Adaptively Secure Identity-Based Broadcast Encryption using CAST Algorithm
An adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext is introduced. The size of public key and private keys of the system are both linear in the maximum number of receivers. The system is fully collusion-resistant and has stateless receivers. Here, in the system CAST algorithm is used for encryption of the broadcast message. The scheme is well opti...
متن کاملThe Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers
The Broadcast Encryption methods, often referred to as revocation schemes, allow data to be efficiently broadcast to a dynamically changing group of users. A special case is when the receivers are stateless [2, 1]. Naor et al. [2] propose the Complete Subset Method (CSM) and the Subset Difference Method (SDM). Asano [1] puts forth two other methods, AM1 and AM2, which use public prime parameter...
متن کاملAn Efficient Revocation Scheme for Stateless Receiver with Less Encryption and Less Key Storage
In the revocation scheme for stateless receivers, the center delivers information securely to the authorized users over a public channel, where the receivers do not update their state from session to session. This paper presents a view of multimedia Conditional Access Systems (CAS) one-way broadcasting and suggests a new approach. The proposed approach is an efficient revocation scheme for stat...
متن کاملVideo Casting Application Oriented Key Exchange
Within video stateless receivers, a central server should deliver information securely to the authorized users, over a public channel, even if receivers do not update their state from session to session. This is the case of a multimedia conditional access systems based on one way broadcasting. This paper suggests a new approach to assure a secure communication in such environments. The proposed...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002