Abstract
In 1993, Beimel and Chor presented an unconditionally secure interactive protocol which allows a subset of users in a network to establish a common key. This scheme made use of a key predistribution scheme due to Blom. In this paper, we describe some variations and generalizations of the Beimel-Chor scheme, including broadcast encryption schemes as well as interactive key distribution schemes. Our constructions use the key predistribution scheme of Blundo et al, which is a generalization of the Blom scheme. We obtain families of schemes in which the amount of secret information held by the network users can be traded off against the amount of information that needs to be broadcast. We also discuss lower bounds on the storage and communcation requirements of protocols of these types. Some of our schemes are optimal (or close to optimal) with respect to these bounds.
Cite
CITATION STYLE
Blundo, C., Mattos, L. A. F., & Stinson, D. R. (1996). Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1109, pp. 387–400). Springer Verlag. https://doi.org/10.1007/3-540-68697-5_29
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.