Broadcasting Session Keys

نویسندگان

  • Evangelos Kranakis
  • Danny Krizanc
  • Paul Van Oorschot
چکیده

This paper considers true broadcast systems for the secure communication of session keys. These are schemes that provide for parallel rather than serial construction of broadcast messages, while avoiding selective broadcasting. We improve upon a model implemented with Shamir's threshold scheme, and use information theoretic techniques to show that this enhancement is optimal. We then present a general foundation upon which true broadcasting can be realized and illustrate its design with two number theoretic implementations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Video Casting Application Oriented Key Exchange

Within video stateless receivers, a central server should deliver information securely to the authorized users, over a public channel, even if receivers do not update their state from session to session. This is the case of a multimedia conditional access systems based on one way broadcasting. This paper suggests a new approach to assure a secure communication in such environments. The proposed...

متن کامل

Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains

Security of group communication for large mobile wireless sensor network hinges on efficient key distribution and key management mechanism. As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed in the key distribution schemes. Therefore, self-healing is a good property for key distribution in wireless applications. The main idea of self-healing ke...

متن کامل

An Efficient Revocation Scheme for Stateless Receiver with Less Encryption and Less Key Storage

In the revocation scheme for stateless receivers, the center delivers information securely to the authorized users over a public channel, where the receivers do not update their state from session to session. This paper presents a view of multimedia Conditional Access Systems (CAS) one-way broadcasting and suggests a new approach. The proposed approach is an efficient revocation scheme for stat...

متن کامل

Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle

The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In th...

متن کامل

A n2+n MQV key agreement protocol

In this paper, a novel scheme to generate (n 2 + n) common secret keys in one session is proposed, in which two parties can use them to encrypt and decrypt their communicated messages by using symmetric-key cryptosystem. The proposed scheme is based on the difficulty of calculating discrete logarithms problem. All the session keys can be used against the known key attacks, main-in-the middle at...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994