Abstract
We introduce new theoretical measures for the qualitative and quantitative assessment of encryption schemes designed for broadcast transmissions. The goal is to allow a central broadcast site to broadcast secure transmissions to an arbitrary set of recipients while minimizing key management related transmissions. We present several schemes that allow a center to broadcast a secret to any subset of privileged users out of a universe of size n so that coalitions of k users not in the privileged set cannot learn the secret. The most interesting scheme requires every user to store O(k log k log n) keys and the center to broadcast O(k 2 log2 k log n) messages regardless of the size of the privileged set. This scheme is resilient to any coalition of k users. We also present a scheme that is resilient with probability p against a random subset of k users. This scheme requires every user to store O(log k log(1/p)) keys and the center to broadcast O(k log2 k log(1/p)) messages.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
N. Alon and J. Spencer, The Probabilistic Method, Wiley, 1992.
J. L. Carter and M. N. Wegman, Universal Classes of Hash Functions, Journal of Computer and System Sciences 18 (1979), pp. 143–154.
W. Diffie and M. Hellman, New Directions in Cryptography, IEEE Trans. on Information Theory, vol. IT-22,6 (1976), pp. 644–654.
M.L. Fredman, J. Komlós and E. Szemerédi, Storing a Sparse Table with O(1) Worst Case Access Time, Journal of the ACM, Vol 31, 1984, pp. 538–544.
O. Goldreich, S. Goldwasser and S. Micali, How to Construct Random Functions Journal of the ACM 33, 1986.
R. Impagliazzo, L. Levin and M. Luby, Pseudo-random Generation given from a One-way Function, Proc. of the 20th ACM Symp. on Theory of Computing, 1989.
K. Mehlhorn, Data Structures and Algorithms: Sorting and Searching, Springer-Verlag, Berlin Heidelberg, 1984.
R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signature and Public Key Cryptosystems, Comm. of ACM, 21 (1978), pp. 120–126.
A. Shamir, On the Generation of Cryptographically Strong Pseudo-Random Number Sequences, ACM Trans. Comput. Sys., 1 (1983), pp. 38–44.
M. N. Wegman and J. L. Carter, New Hash Functions and Their Use in Authentication and Set Equality, Journal of Computer and System Sciences 22, pp. 265–279 (1981).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fiat, A., Naor, M. (1994). Broadcast Encryption. In: Stinson, D.R. (eds) Advances in Cryptology — CRYPTO’ 93. CRYPTO 1993. Lecture Notes in Computer Science, vol 773. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48329-2_40
Download citation
DOI: https://doi.org/10.1007/3-540-48329-2_40
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57766-9
Online ISBN: 978-3-540-48329-8
eBook Packages: Springer Book Archive