Abstract
The security of many emerging applications is based upon broadcast encryption scheme, for example teleconference, pay-TV. This Paper detailed analyzes the scenario of Cable TV, and present the disadvantages of previous BES. In this paper, we improve and enhance the main broadcast encryption schemes so that they can be adapted by Cable TV. Finally, we make a comparison of these BES, and present their future application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)
Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)
Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61–80. Springer, Heidelberg (2003)
Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005), http://eprint.iacr.org/2005/018.pdf
Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47–60. Springer, Heidelberg (2002)
Wallner, D.M., Harder, E.J., Agee, R.C.: Key Management for Multiast: Issues and Architectures, IETF draft wallner-key (July 1997), ftp://ftp.ietf.org/internet-drafts/draft-wallner-key-arch-01.txt
Wong, K., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. In: SIGCOMM 1998 (1998)
Berkovits, S.: How to Broadcast a Secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535–541. Springer, Heidelberg (1991)
Chiou, G.H., Chen, W.T.: Secure Broadcasting using the Secure Lock. IEEE Trans. On Software Engineering 15, 929–934 (1989)
Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient Tree-Based Revocation in Groups of Low-State Devices. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 511–527. Springer, Heidelberg (2004)
Chen, W., Ge, Z., Zhang, C., Kurose, J., Towsley, D.: On Dynamic Subset Difference Revocation Scheme (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Qi, Z., Huang, Y. (2011). Improvement of the Subset-Cover Broadcast Encryption Scheme. In: Wu, Y. (eds) Advances in Computer, Communication, Control and Automation. Lecture Notes in Electrical Engineering, vol 121. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25541-0_54
Download citation
DOI: https://doi.org/10.1007/978-3-642-25541-0_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25540-3
Online ISBN: 978-3-642-25541-0
eBook Packages: EngineeringEngineering (R0)