Broadcast Encryption Clause Samples
Broadcast Encryption. Fiat and Naor (1993) proposed the concept of broadcast encryption in 1993. In this scheme, sender allows to send a ciphertext to a designated group whose members of the group can decrypt it with his or her private key. However, nobody outside the group can decrypt the message. Broadcast encryption is widely used in the present day in many aspects, such as VoIP, TV subscription services over the Internet, communication among group members or from someone outside the group to the group members. This type of scheme also can be extended in networks like mobile multi-hop networks, which each node in these networks has limitation in computing and storage resources. The original scheme which is proposed by Fiat and Naor was to prove that two devices which were not known each other could agree on a common key for secure communications over a one-way communication. This is different from a traditional secure transmission of information using public key cryptography in which devices must know about each other and agree on encryption keys before transmission. Broadcast encryption allows devices which may not have existed, when a group was firstly formed, can join into the group and communicate securely. In the original broadcast encryption scheme proposed by Fiat and Naor, there exists a key distribution center. The center allocates predefined keys for all of the users in a group. It was also a zero-message scheme in which the broadcast center did not have to broadcast a message for the members to be able to compute the key. It could be computed from information that the members receives from the center, and from other members. The scheme is a k-resilient broadcast encryption scheme in which it is secure against a coalition of at most k non-privileged users. There are many research papers about broadcast group-oriented encryption as in Ma, ▇▇, and ▇▇ (2006) and Ma and Ao (2009). The former proposes a novel broadcast encryption used in the group communication. It is an asymmetric group key agreement scheme achieved a broadcast message with constant ciphertexts and private keys. The later proposes the improved version by including the identity of users to the previous scheme, and it is secure against chosen ciphertext attack and the key generation withstands collude attack from the users of the group. Because a member’s identity is included in a private key generation, two or more members cannot forge a new private key to the other. The review of these papers can be fo...
Broadcast Encryption. The idea behind TSE is allowing a user to specify during what time interval a ciphertext can be decrypted by the receiver. This is done in the following manner in TSE: a Time Server broadcasts a key, a Time Instant Key (TIK) kt at the begining of each time unit, t. The TIK is available to all users. A sender, who wants to encrypt a message m to form a ciphertext c, can specify any interval [t0, t1], with t0 ≤ t1. In Plain TSE, a receiver can recover the message outputs the master public key ID-MPK and the master secret key ID-MSK. • TIK-Ext This algorithm is run by the TS, takes as input TS-MPK, TS-MSK, t and outputs kt which is broadcast by TS at time t.
