Advances in Cryptology — EUROCRYPT ’91
DOI: 10.1007/3-540-46416-6_50
|View full text |Cite
|
Sign up to set email alerts
|

How To Broadcast A Secret

Abstract: A single transmitter wishes to broadcast a secret to some subset of his listeners. He does not wish to perform, for each of the intended recipients, a separate encryption either of the secret or of a single key with which to protect the secret. A general method for such a secret broadcasting scheme is proposed. It is based on "k out of n" secret sharing. An example using polynomial interpolation is presented as well as a related vector formulation.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
113
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 209 publications
(120 citation statements)
references
References 2 publications
0
113
0
Order By: Relevance
“…For example, [12] focused on secure multicast group key management in the network and [1] proposed broadcast encryption schemes that disseminate a secret to only the privileged clients. However, key management and cryptography are not the focus of this paper and we try to address the security issue from data management aspect.…”
Section: Related Workmentioning
confidence: 99%
“…For example, [12] focused on secure multicast group key management in the network and [1] proposed broadcast encryption schemes that disseminate a secret to only the privileged clients. However, key management and cryptography are not the focus of this paper and we try to address the security issue from data management aspect.…”
Section: Related Workmentioning
confidence: 99%
“…The notion of broadcast encryption was introduced by Berkovits [3] and Fiat et al [10] independently. The main criteria for this technology are the number of ciphertexts (the length of the message) to be broadcast, the number of keys each receiver stores, and the computational overhead at a receiver.…”
Section: Related Workmentioning
confidence: 99%
“…Over time, however, the broadcaster may not always desire that all users receive its messages. Thus one can consider the problem of transmitting a message only to some small specified subset of the users, and indeed this has been considered in the literature [1]. For the case of a broadcast channel shared by numerous users, we argue that an equally, if not more, interesting problem is the complement of the above problem: how to transmit a message over a broadcast channel shared by an exponential number N = 2 n of users so that all but some specified small coalition of k excluded users can decipher the message, even if these excluded users collude with each other in an arbitrary manner.…”
Section: Introductionmentioning
confidence: 99%
“…In a computationally limited world, these devices could function using private-key encryption, or using public-key encryption. 1 In this framework, to solve broadcast security problems like the one we consider, the objective would be to distribute decryption devices to users such that the following property would hold: given some set of excluded users, one could determine a small set of encryption devices, such that none of the excluded users would have the corresponding decryption devices, while each non-excluded user would have at least one such decryption device. One could then broadcast the message using these encryption devices, and only the designated recipients would be able to decrypt it.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation