A Survey of Broadcast Encryption

نویسنده

  • Jeremy Horwitz
چکیده

Broadcast encryption is the problem of a sending an encrypted message to a large user base such that the message can only be decrypted by a dynamically changing privileged subset. The study of broadcast encryption has become more and more important with the ever-increasing concern about copyright issues and the increasing interest in secure multicasting (over cable television and the Internet). We discuss the early broadcast-encryption results of Fiat and Naor [3], presenting several broadcast-encryption schemes from that paper. Next, we discuss Naor, Naor, and Lotspiech’s [6] subset-cover model, an abstract framework for broadcast-encryption schemes. We then discuss instances of the subset-cover model. This is followed by discussion of a method of Halevy and Shamir [4] that improves upon [6]’s best example of a subset-cover scheme. We finish with a discussion of traitor tracing — the problem of, given an illegal decoder box, punishing the users who contributed keys to it. In particular, we focus on traitor-tracing algorithms for (some) subset-cover schemes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm

For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

Half-Broadcast Encryption for Anonymity

Broadcast Encryption(BE) have been widely used to pay TV, distributed systems and others. In general concept of this encryption, most BE schemes have to broadcast all packets to all network because of intermediate nodes cannot know accurate nodes needing broadcasted packets due to encryption. In this paper, we propose Half-Broadcast Encryption(HBE). Recently, a number of distributed systems hav...

متن کامل

Broadcast Encryption

Broadcast encryption is an interesting application of cryptography which allows one to broadcast a secret to a changing group of intended recipients in such a way that no one outside this group can view the secret. Interest in using broadcast encryption techniques has grown considerably in recent years and such techniques have been integrated in many applications and technologies such as virtua...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003