Some New Results on Key Distribution Patterns and Broadcast Encryption |
| |
Authors: | Doug R. Stinson Tran van Trung |
| |
Affiliation: | (1) Department of Computer Science and Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA;(2) Institute for Experimental Mathematics, University of Essen, Ellernstraße 29, 45326 Essen, Germany |
| |
Abstract: | This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families. |
| |
Keywords: | key distribution broadcast encryption combinatorial designs |
本文献已被 SpringerLink 等数据库收录! |
|