DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mihaljević, Miodrag J. | en |
dc.contributor.author | Fossorier, Marc P. C. | en |
dc.contributor.author | Imai, Hideki | en |
dc.date.accessioned | 2020-03-05T20:28:23Z | - |
dc.date.available | 2020-03-05T20:28:23Z | - |
dc.date.issued | 2004-12-01 | en |
dc.identifier.isbn | 978-3-540-30191-2 | - |
dc.identifier.issn | 0302-9743 | en |
dc.identifier.uri | http://researchrepository.mi.sanu.ac.rs/handle/123456789/122 | - |
dc.description.abstract | The problem of minimizing the amount of secret information (secret bits) required for certain key management schemes is addressed. It is important to note that the secret storage minimization originates from the fact that this storage should be both read-proof and tamper-proof. The proposed minimization of the secret storage at the user's side is based on an appropriate trade-off between the required public storage and the processing complexity. As the main components, two methods are proposed for assigning multiple roles to the same secret key bits, and both of them require only simple operations implying a high implementation efficiency. The first proposed one-way mapping is based on certain sequence comparison issues and the second one follows the model of a communication channel with erasures. Employment of a proposed mapping method in two computationally secure key management schemes for the broadcast encryption SD and LSD is considered and the modified versions of these schemes with minimized secret storage requirements are proposed. The main overheads of the original and the modified SD and LSD based schemes are compared and the advantages of the modified schemes are pointed out. Also, it is shown that the proposed secret to public storage exchange preserves the security of the original SD and LSD schemes. | en |
dc.publisher | Springer Link | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en |
dc.subject | Broadcast encryption | Erasure channels | Key management | One-way mapping | Pseudorandom number generators | System overheads trade-off | en |
dc.title | Secret-public storage trade-off for broadcast encryption key management | en |
dc.type | Article | en |
dc.identifier.doi | 10.1007/978-3-540-30191-2_29 | - |
dc.identifier.scopus | 2-s2.0-27644502142 | en |
dc.contributor.affiliation | Mathematical Institute of the Serbian Academy of Sciences and Arts | - |
dc.relation.firstpage | 375 | en |
dc.relation.lastpage | 387 | en |
dc.relation.volume | 3269 | en |
dc.description.rank | M23 | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.openairetype | Article | - |
item.cerifentitytype | Publications | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
crisitem.author.orcid | 0000-0003-3047-3020 | - |
SCOPUSTM
Citations
5
checked on Nov 25, 2024
Page view(s)
17
checked on Nov 24, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.