Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2004.11C.2.149

A Efficient Key Generation and Renewal for Broadcast Encryption  

Lee, Deok-Gyu (순천향대학교 대학원 전산학과)
Lee, Im-Yeong (순천향대학교 정보기술공학부)
Abstract
Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. Important thing is that only user who is permitted before only must be able to get digital information in broadcast encryption schemes. If broadcast message transfers, users who authority is get digital information to use private key given in the advance by oneself. Thus, user acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. Take advantage of two technique of proposal system. One is method that server creates key forecasting user without user's agreement, and another is method that server and user agree each other and create key Advantage of two proposal system because uses a secret key broadcast message decryption do can and renewal is available effectively using one information whatever key renewal later.
Keywords
Broadcast Encryption; Key Generation; Key Renewal;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Carlo Blundo, Luiz A.Frota Mattos and Douglas R.Stinson, 'Trade-offs Between Communication and Stroage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution,' In Advances in Cryptology-Crypro '96, Lecture Notes in Computer Science 1109, pp.387-400
2 A. Narayana, 'Practical Pay TV Schemes,' to appear in the Proceedings of ACISP 03, July, 2003
3 Danald Beaver and Nicol So, 'Globai, Unpredictable Bit Generation Without Broadcast,' EUROCRYPT '93, Volume 765 of Lecture Notes in Computer Science, Springer-Verlag, pp.424-434, p.23-27, May, 1993
4 D. Boneh and M. Franklin, 'An Efficient Public Key Traitor Tracing Scheme,' CRYPTO '99, LNCS 1666, pp. 338-353, 1999
5 Carlo Blundo and A. Cresti, 'Space Requirements for Broadcast Encryption,' EUROCRYPT '94, LNCS 950, pp.287-298, 1994   DOI
6 Dong Hun Lee, Hyun Jung Kim and Jong In Lim, 'Efficient Public-Key Traitor Tracing in Provably Secure Broadcast Encryption with Unlimited Revocation Capabillity,' KoreaCrypto '02, 2003
7 Dani Halevy and Adi Shamir, 'The LSD Broadcast Encryption Scheme,' Crypto '02, Lecture Notes in Computer Science, Vol.2442, pp.47-60, 2002
8 Michel Abdalla, Yucal Shavitt and Avishai Wool, 'Towards Marking Broadcast Encryption Practical,' IEEE/ACM Transaction on Networking, Vol.8, No.4, pp.443-454, August, 2000   DOI   ScienceOn
9 Ignacio Gracia, Sebastia Martin and Carles Padro, 'Improving the Trade-off Between Strorage and Communication in Broadcast Encryption Schemes,' 2001
10 Juan A. Garay, Jessica Staddon and Avishai Wool, 'Long-Lived Broadcast Encryption,' In Crypto 2000 volume 1880 of Springer Lecture Notes in computer Science, pp.333-352, 2000
11 Yevgeniy Dodis and Nelly Fazio, 'Public Key Broadcast Encryption for Stateless Receivers,' ACM Workshop on Digital Rights Management, 2002
12 C. Blundo, Luiz A. Frota Mattos and D. R. Stinson, 'Generalized Beimel-Chor schemes for Broadcast Encryption and Interactive Key Distribution,' Theoretical Computer Science, Vol.200, pp.313-334, 1998   DOI   ScienceOn
13 Amos Fiat and Moni Naor, 'Broadcast Encryption,' Crypto'93, pp.480-491, 1993