CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Broadcast Encryption's Bright Future
Computer
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
The LSD Broadcast Encryption Scheme
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
Efficient Time-Bound Hierarchical Key Assignment Scheme
IEEE Transactions on Knowledge and Data Engineering
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
One-Way chain based broadcast encryption schemes
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Security weaknesses of certain broadcast encryption schemes
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
On advanced cryptographic techniques for information security of smart grid AMI
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Hi-index | 0.00 |
This paper proposes a novel broadcast encryption (BE) approach which combines the traditional one and time-bound cryptographic keys. The developed BE provides heavy reduced cumulative communication overhead and yields increased security. The reduction of the communication overhead is achieved via employment of time-bound session encrypting keys (TB-SEKs). The increased security against ciphertext only attack appears as a consequence of the reduced communication overhead and the increased security against the chosen-plaintext attack is obtained via employment of the time-bound key-encrypting keys (TB-KEKs). Appropriate methods for management of TB-SEKs and TB-KEKs are given. The proposed scheme is compared with traditional BE schemes and the advantages as well as the related trade-offs are pointed out.