Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution

87Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In 1993, Beimel and Chor presented an unconditionally secure interactive protocol which allows a subset of users in a network to establish a common key. This scheme made use of a key predistribution scheme due to Blom. In this paper, we describe some variations and generalizations of the Beimel-Chor scheme, including broadcast encryption schemes as well as interactive key distribution schemes. Our constructions use the key predistribution scheme of Blundo et al, which is a generalization of the Blom scheme. We obtain families of schemes in which the amount of secret information held by the network users can be traded off against the amount of information that needs to be broadcast. We also discuss lower bounds on the storage and communcation requirements of protocols of these types. Some of our schemes are optimal (or close to optimal) with respect to these bounds.

Cite

CITATION STYLE

APA

Blundo, C., Mattos, L. A. F., & Stinson, D. R. (1996). Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1109, pp. 387–400). Springer Verlag. https://doi.org/10.1007/3-540-68697-5_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free