Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments

نویسندگان

  • Deok-Gyu Lee
  • Jang-Su Park
  • Im-Yeong Lee
چکیده

The method of broadcast encryption has been applied to the transmission of digital information such as multimedia, software, and paid TV on the open network. In this broadcast encryption method, only previously authorized users can gain access to digital in-formation. When broadcast message is transmitted, authorized users can first decode the session key using the previously given private key and get digital information using this ses-sion key. This way, users retrieve a message or a session key using the key transmitted by broadcasters. For their part, broadcasters need to generate and distribute keys. Broadcast-ers should also carry out efficient key renewal when users subscribe or unsubscribe. This paper introduces how to generate and distribute key efficiently and how key renewal works. The proposal uses two methods: (1) the server generates keys without the consent of us-ers by anticipating users, and; (2) the server and users generate keys by mutual agreement. The advantage of the two proposed methods is that the receiver can decode broadcast message using a secret key. Even if the key is re-newed later, the user can efficiently renew using only a single set of information.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

متن کامل

Broadcast Encryption Using Probabilistic Key Distribution and Applications

A family of novel broadcast encryption schemes based on probabilistic key pre-distribution are proposed, that enable multiple sources to broadcast secrets, without the use of asymmetric cryptographic primitives. A comprehensive analysis of their efficiencies and performance bounds are presented. The paper also suggests a framework for applications of broadcast encryption, depending on 1) the re...

متن کامل

Reputable Re-encryption in Unrepeatable Clouds

In our Scheme cloud computing users has to get Key information to Re Encrypt the data which has been in Encrypted to get Key information in order to decrease the number of keys used we are proposing Broadcast encryption Broadcast encryption is the cryptographic problem of delivering encrypted content over a broadcast channel in such a way that only qualified users can decrypt the content. The c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006