Secret-Public Storage Trade-Off for Broadcast Encryption Key Management
- 692 Downloads
The problem of minimizing the amount of secret information (secret bits) required for certain key management schemes is addressed. It is important to note that the secret storage minimization originates from the fact that this storage should be both read-proof and tamper-proof. The proposed minimization of the secret storage at the user’s side is based on an appropriate trade-off between the required public storage and the processing complexity. As the main components, two methods are proposed for assigning multiple roles to the same secret key bits, and both of them require only simple operations implying a high implementation efficiency. The first proposed one-way mapping is based on certain sequence comparison issues and the second one follows the model of a communication channel with erasures. Employment of a proposed mapping method in two computationally secure key management schemes for the broadcast encryption SD and LSD is considered and the modified versions of these schemes with minimized secret storage requirements are proposed. The main overheads of the original and the modified SD and LSD based schemes are compared and the advantages of the modified schemes are pointed out. Also, it is shown that the proposed secret to public storage exchange preserves the security of the original SD and LSD schemes.
Keywordsbroadcast encryption key management system overheads trade-off one-way mapping pseudorandom number generators erasure channels
Unable to display preview. Download preview PDF.
- 2.Chick, G.C., Tawares, S.E.: Flexible access control with master keys. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 316–322. Springer, Heidelberg (1990)Google Scholar
- 7.Lotspiech, J., Nusser, S., Prestoni, F.: Broadcast encryption’s bright future. IEEE Computer 35, 57–63 (2002)Google Scholar
- 11.Mihaljević, M.J., Fossorier, M.P.C., Imai, H.: The key management with minimized secret storage employing erasure channel approach (August 2004) (submitted)Google Scholar
- 13.Zheng, Y., Hardjono, T., Pieprzyk, J.: Sibling intractable function families and their applications. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 124–138. Springer, Heidelberg (1993)Google Scholar