首页 | 本学科首页   官方微博 | 高级检索  
     


Some New Results on Key Distribution Patterns and Broadcast Encryption
Authors:Doug R. Stinson  Tran van Trung
Affiliation:(1) Department of Computer Science and Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA;(2) Institute for Experimental Mathematics, University of Essen, Ellernstraße 29, 45326 Essen, Germany
Abstract:This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.
Keywords:key distribution  broadcast encryption  combinatorial designs
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号