CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Unconditional secure conference key distribution schemes with disenrollment capability
Information Sciences—Informatics and Computer Science: An International Journal
Key management for restricted multicast using broadcast encryption
IEEE/ACM Transactions on Networking (TON)
ACM SIGKDD Explorations Newsletter
Broadcast Encryption's Bright Future
Computer
Probabilistic optimization techniques for multicast key management
Computer Networks: The International Journal of Computer and Telecommunications Networking
The LSD Broadcast Encryption Scheme
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Fast Digital Identity Revocation (Extended Abstract)
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Agents for Information Broadcasting
ATAL '99 6th International Workshop on Intelligent Agents VI, Agent Theories, Architectures, and Languages (ATAL),
Information Sciences: an International Journal
All-in-one group-oriented cryptosystem based on bilinear pairing
Information Sciences: an International Journal
A target advertisement system based on TV viewer's profile reasoning
Multimedia Tools and Applications
Optimal subset-difference broadcast encryption with free riders
Information Sciences: an International Journal
Target advertisement service using TV viewers’ profile inference
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part I
Fast algorithms for the free riders problem in broadcast encryption
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Key updating technique in identity-based encryption
Information Sciences: an International Journal
Tabu search based multi-watermarks embedding algorithm with multiple description coding
Information Sciences: an International Journal
Provably secure threshold public-key encryption with adaptive security and short ciphertexts
Information Sciences: an International Journal
Hi-index | 0.07 |
Broadcast encryption (BE) deals with secure transmission of a message to a group of users such that only an authorized subset of users can decrypt the message. Some of the most effective BE schemes in the literature are the tree-based schemes of complete subtree (CS) and subset difference (SD). The key distribution trees in these schemes are traditionally constructed without considering user preferences. In fact these schemes can be made significantly more efficient when user profiles are taken into account. In this paper, we consider this problem and study how to construct the CS and SD trees more efficiently according to user profiles. We first analyze the relationship between the transmission cost and the user profile distribution and prove a number of key results in this aspect. Then we propose several optimization algorithms which can reduce the bandwidth requirement of the CS and SD schemes significantly. This reduction becomes even more significant when a number of free riders can be allowed in the system.