Advanced SearchSearch Tips
A Transmission-Efficient Broadcast Encryption System Based on Secret Sharing Method
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
  • Journal title : Journal of Broadcast Engineering
  • Volume 21, Issue 3,  2016, pp.412-424
  • Publisher : The Korean Institute of Broadcast and Media Engineers
  • DOI : 10.5909/JBE.2016.21.3.412
 Title & Authors
A Transmission-Efficient Broadcast Encryption System Based on Secret Sharing Method
Lee, Jae Hwan; Park, Jong Hwan;
  PDF(new window)
Broadcast encryption (BE) is a cryptographic primitive that enables a sender to broadcast a message to a set of receivers in a secure channel. The efficiency of BE is measured by three factors: ciphertext transmission cost, user storage cost, and computational cost for decryption. In general, BE is applied to the environments where a large number of receivers should be accommodated, so that the transmission cost is considered as being the most important factor. In this paper, we suggest a new BE system, using Shamir`s secret sharing method, which considerable reduces the transmission cost. In comparison to the previous Subset Difference (SD) system, the transmission size of our BE is longer until , but get shorter when for number of revoked users and n number of total users. We show that the advantage can be achieved at the slight expense of both the storage and computational costs.
broadcast encryption;secret sharing;
 Cited by
A. Fiat and M. Naor, "Broadcast encryption," Proceedings of the CRYPTO'93, volume 773 of LNCS, pp. 480-491, Aug. 1993.

D. Naor, M. Naor and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," Proceedings of the CRYPTO 2001, vol. 2139 of LNCS, pp. 41-62, Feb. 2001.

Y. Dodis and N. Fazio, "Public key broadcast encryption for stateless receivers," Proceedings of the Digital Rights Management Workshop, vol. 2696 of Lecture Notes in Computer Science, pp. 61-80, 2002.

D. Boneh, C. Gentry and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," Proceedings of the CRYPTO 2005, vol. 3621 of LNCS, pp. 258-275, Aug.2005.

C. H. Kim, Y. H. Hwang and P. J. Lee, "An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack," Proceedings of the ASIACRYPT 2003, vol. 2894 of LNCS, pp. 359-373, Nov/Dec. 2003.

D. Halevy and A. Shamir, "The LSD broadcast encryption scheme," Proceedings of the CRYPTO 2002, vol. 2442 of LNCS, pp. 47-60, Aug. 2002.

M.T. Goodrich, J.Z. Sun and R. Tamassia, "Efficient tree-based revocation in groups of low-state devices," Proceedings of the CRYPTO 2004, vol. 3152 of LNCS, pp. 511-527, Aug. 2004.

S. Bhattacherjee and P. Sarkar, "Tree based symmetric key broadcast encryption", IACR Cryptology ePrint Archive, Report 2013/786, 2013.

J. H. Lee and J. H. Park, “Broadcast encryption system using secret sharing and subset difference methods”, Journal of Broadcast Engineering, 20(1), pp.92-109, Jan. 2015. crossref(new window)

J. H. Lee and J. H. Park, “2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method”, Journal of Broadcast Engineering, 20(4), pp.93-110, Jul. 2015.