The Study of Broadcast Encryption on Cable TV Applications

Article Preview

Abstract:

The security of many emerging applications is based on broadcast encryption scheme, for example teleconference, pay-TV, etc. This Paper detailed analyzes the scenario of Cable TV, comprehensively studies the mostly all proposed broadcast encryption schemes. Finally we improved and enhanced the main broadcast encryption schemes so that they can be adapted by Cable TV.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

280-285

Citation:

Online since:

June 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Berkovits: How to broadcast a secret. Proceedings of Eurocrypt'91, LNCS 547, pp.536-541, (1991).

Google Scholar

[2] A. Fiat, Moni Naor: Broadcast encryption. Proceedings of Crypto'93, LNCS 773, pp.480-491, (1993).

DOI: 10.1007/3-540-48329-2_40

Google Scholar

[3] C. K. Wong, M. Gouda and S. Lam: Secure Group Communications Using Key Graphs, SIGCOMM (1998).

Google Scholar

[4] D.M. Wallner, E.J. Harder and R.C. Agee: Key Management for Multiast: Issues andArchitectures, IETF draft wallner-key, (1997).

DOI: 10.17487/rfc2627

Google Scholar

[5] D. Naor, M. Naor, J. Lotspiech: Revocation and tracing schemes for stateless receivers. Proceedings of Crypto'01, LNCS 2139, pp.41-62, (2001).

DOI: 10.1007/3-540-44647-8_3

Google Scholar

[6] D. Halevy, A. Shamir: The LSD broadcast encryption scheme. Proceedings of Crypto'02, LNCS 2442, pp.47-60, (2002).

DOI: 10.1007/3-540-45708-9_4

Google Scholar

[7] R. Nojima, Y. Raji, Using trapdoor permutations in a complete subtree method for broadcast encryption, IEICE vol. e88-a, pp.568-574, (2005).

DOI: 10.1093/ietfec/e88-a.2.568

Google Scholar

[8] T. Asano: Reducing storage at receivers in SD and LSD broadcast encryption schemes. Proceedings of 4th Workshop of Information Security Applications(WISA), LNCS 2908, pp.317-332.

DOI: 10.1007/978-3-540-24591-9_24

Google Scholar

[9] D. Naor, M. Naor: Protecting cryptographic keys: the trace and revoke approach, IEEE computer, Vol. 36, NO. 7, pp.47-53, (2003).

DOI: 10.1109/mc.2003.1212690

Google Scholar

[10] Ignacio Gracia, Sebatia Matin, Carles Padro: Improving the trade-off between storage and communication in broadcast encryption schemes. Discrete Applied Mathematics, Vol. 143, Issue. 1-3, pp.213-220, (2004).

DOI: 10.1016/j.dam.2004.02.015

Google Scholar

[11] Eum Sun Yoo, Nam-su Jho, Jung Hee Cheon, Myung-Hwan Kim: Efficient Broadcast Encryption using Multiple interpolation Methods. Proceedings of International conferen ce on Information security and cryptology, pp.87-103, (2004).

DOI: 10.1007/11496618_8

Google Scholar

[12] Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, and Eun Sun Yoo: Broadcast Encryption Scheme ,Eurocrypt'05.

Google Scholar

[13] Sarang Aravamuthan, Sachin Lodha: An Optimal Subset Cover for Broadcast Encryption.

Google Scholar

[14] Y. Dodis, N. Fazio: Public key broadcast encryption secure against adaptive chosen ciphertext attack. Workshop on Public Key Cryptography PKC'03. LNCS 2567, pp.100-115, Springer-Verlag, (2003).

DOI: 10.1007/3-540-36288-6_8

Google Scholar

[15] Yong Ho Hwang, Pil Joong Lee: efficient broadcast encryption with log-key storage.

Google Scholar

[16] Xinjun Du, Ying Wang, Jianhua Ge, Yuming Wang: An ID-Based Broadcast Encryption scheme for key distribution. IEEE Transactions on Broadcasting, Vol. 51, NO. 2, pp.264-266.

DOI: 10.1109/tbc.2005.847600

Google Scholar

[17] Lyuu YD, Wu ML: A fully public key traitor tracing scheme. WSEA Trans. on Circuits 1, 88−93, (2002).

Google Scholar

[18] Dan Boneh and Brent Waters: A fully collusion resistant broadcast, trace, and revoke system. In Proceedings of ACM Computer and Communications Security, (2006).

DOI: 10.1145/1180405.1180432

Google Scholar

[19] Miodrag J. Mihaljevic, Marc P.C. Fossorier, Hideki Imai: Time-data-memory trade-off based cryptanalysis of certain broadcast encryption schemes. IACR, Cryptology ePrint Archive, Report 2005/099, (2005).

DOI: 10.1109/lcomm.2007.071029

Google Scholar

[20] D. Boneh, Craig Gentry, B. Waters: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. Appear at Crypto'05.

DOI: 10.1007/11535218_16

Google Scholar