Skip to main content

Broadcast Encryption

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 161 Accesses

Definition

The concept of broadcast encryption deals with methods that allow to efficiently transmit information to a dynamically changing group of privileged users who are allowed to receive the data. It is often convenient to think of it as a revocation scheme, which addresses the case where some subset of the users are excluded from receiving the information.

Background

The problem of a center transmitting data to a large group of receivers so that only a predefined subset is able to decrypt the data is at the heart of a growing number of applications. Among them are pay-TV applications, multicast (or secure group) communication, secure distribution of copyright-protected material (e.g., music), digital rights management, and audio streaming. Different applications impose different rates for updating the group of legitimate users. Users are excluded from receiving the information due to payments, subscription expiration, or since they have abused their rights in the past.

One...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Content Protection for Recordable Media. http://www.4centity.com/4centity/tech/cprm

  2. Lotspiech J, Nusser S, Pestoni F (2002) Broadcast encryption’s bright future. Computer 35(8):57–63

    Article  Google Scholar 

  3. Berkovits S (1991) How to broadcast a secret. In: Davies DW (ed) Advances in cryptology – EUROCRYPT’91, Brighton, April 1991. Lecture Notes in Computer Science, vol 547. Springer, Berlin, pp 535–541

    Google Scholar 

  4. Fiat A, Naor M (1994) Broadcast encryption. In: Stinson DR (ed) Advances in cryptology – CRYPTO’93, Santa Barbara, August 1993. Lecture Notes in Computer Science, vol 773. Springer, Berlin, pp 480–491

    Google Scholar 

  5. Canetti R, Garay J, Itkis G, Micciancio D, Naor M, Pinkas B (1999) Multicast security: a taxonomy and some efficient constructions. In: Proceedings of IEEE INFOCOM’99, New York, March 1999, vol 2, pp 708–716

    Google Scholar 

  6. Garay JA, Staddon J, Wool A (2000) Long-lived broadcast encryption. In: Bellare M (ed) Advances in cryptology – CRYPTO 2000, Santa Barbara, August 2000. Lecture Notes in Computer Science, vol 1880. Springer, Heidelberg, pp 333–352

    Google Scholar 

  7. Halevy D, Shamir A (2002) The LSD broadcast encryption scheme. In: Yung M (ed) Advances in cryptology – CRYPTO 2002, Santa Barbara, August 2002. Lecture Notes in Computer Science, vol 2442. Springer, Berlin

    Google Scholar 

  8. Kumar R, Rajagopalan R, Sahai A (1999) Coding constructions for blacklisting problems without computational assumptions. In: Wiener J (ed) Advances in cryptology – CRYPTO’99, Santa Barbara, August 1999. Lecture Notes in Computer Science, vol 1666. Springer, Heidelberg, pp 609–623

    Google Scholar 

  9. Luby M, Staddon J (1998) Combinatorial bounds for broadcast encryption. In: Nyberg K (ed) Advances in cryptology – EUROCRYPT’98, Espoo, May–June 1998. Lecture Notes in Computer Science, vol 1403. Springer, Heidelberg, pp 512–526

    Google Scholar 

  10. Naor D, Naor M (2003) Protecting cryptographic keys: the trace and revoke approach. Computer 36(7):47–53

    Article  MathSciNet  Google Scholar 

  11. Naor D, Naor M, Lotspiech J (2001) Revocation and tracing schemes for stateless receivers. In: Killian J (ed) Advances in cryptology – CRYPTO 2001, Santa Barbara, August 2001. Lecture Notes in Computer Science, vol 2139. Springer, Berlin, pp 41–62. Full version: ECCC Report 43, 2002. http://www.eccc.uni-trier.de/eccc/

  12. Naor M, Pinkas B (2001) Efficient trace and revoke schemes. In: Frankel Y (ed) Financial cryptography, fourth international conference, FC 2000 Proceedings, Anguilla, February 2000. Lecture Notes in Computer Science, vol 1962. Springer, Berlin, pp 1–20

    Google Scholar 

  13. Wallner DM, Harder EJ, Agee RC (1999) Key management for multicast: issues and architectures. Internet Request for Comments 2627. ftp.ietf.org/rfc/rfc2627.txt

  14. Wong CK, Gouda M, Lam S (1998) Secure group communications using key graphs. In: Proceedings of the ACM SIGCOMM’98, Vancouver, pp 68–79

    Google Scholar 

  15. Canetti R, Malkin T, Nissim K (1999) Efficient communication-storage tradeoffs for multicast encryption. In: Stern J (ed) Advances in cryptology – EUROCRYPT’99, Prague, May 1999. Lecture Notes in Computer Science, vol 1592. Springer, Berlin, pp 459–474

    Google Scholar 

  16. McGrew D, Sherman AT (1998) Key establishment in large dynamic groups using one-way function trees. www.csee.umbc.edu/sherman/

  17. Perrig A, Song D, Tygar JD (2001) ELK, a new protocol for efficient large-group key distribution. In: 2001 IEEE symposium on research in security and privacy, Oakland, pp 247–262

    Google Scholar 

  18. Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B (1999) The VersaKey framework: versatile group key management. IEEE J Sel Area Commun 17(9):1614–1631

    Article  Google Scholar 

  19. Goldreich O, Goldwasser S, Micali S (1986) How to construct random functions. J Assoc Comput Mach 33(4):792–807

    MathSciNet  Google Scholar 

  20. Wong CK, Lam S (2000) Keystone: a group key management service. In: International conference on telecommunications, Acapulco, May 2000

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Naor, D. (2011). Broadcast Encryption. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_143

Download citation

Publish with us

Policies and ethics