Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 4 von 362
Open Access
The LSD Broadcast Encryption Scheme
Advances in Cryptology — CRYPTO 2002, 2002, p.47-60
2002

Details

Autor(en) / Beteiligte
Titel
The LSD Broadcast Encryption Scheme
Ist Teil von
  • Advances in Cryptology — CRYPTO 2002, 2002, p.47-60
Ort / Verlag
Berlin, Heidelberg: Springer Berlin Heidelberg
Erscheinungsjahr
2002
Link zum Volltext
Quelle
Alma/SFX Local Collection
Beschreibungen/Notizen
  • Broadcast Encryption schemes enable a center to broadcast encrypted programs so that only designated subsets of users can decrypt each program. The stateless variant of this problem provides each user with a fixed set of keys which is never updated. The best scheme published so far for this problem is the “subset difference” (SD) technique of Naor Naor and Lotspiech, in which each one of the n users is initially given O(log2(n)) symmetric encryption keys. This allows the broadcaster to define at a later stage any subset of up to r users as “revoked”, and to make the program accessible only to their complement by sending O(r) short messages before the encrypted program, and asking each user to perform an O(log(n)) computation. In this paper we describe the “Layered Subset Difference” (LSD) technique, which achieves the same goal with O(log1+∈(n)) keys, O(r) messages, and O(log(n)) computation. This reduces the number of keys given to each user by almost a square root factor without affecting the other parameters. In addition, we show how to use the same LSD keys in order to address any subset defined by a nested combination of inclusion and exclusion conditions with a number of messages which is proportional to the complexity of the description rather than to the size of the subset. The LSD scheme is truly practical, and makes it possible to broadcast an unlimited number of programs to 256,000,000 possible customers by giving each new customer a smart card with one kilobyte of tamper-resistant memory. It is then possible to address any subset defined by t nested inclusion and exclusion conditions by sending less than 4t short messages, and the scheme remains secure even if all the other users form an adversarial coalition.
Sprache
Englisch
Identifikatoren
ISBN: 9783540440505, 354044050X
ISSN: 0302-9743
eISSN: 1611-3349
DOI: 10.1007/3-540-45708-9_4
Titel-ID: cdi_pascalfrancis_primary_14840567

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX