On key distribution via true broadcasting

Mike Just, Evangelos Kranakis, Danny Krizanc, Paul Van Oorschot

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

Abstract

We consider true broadcast systems for the secure communication of session keys. These schemes provide for parallel rather than serial construction of broadcast messages, while avoiding selective broadcasting. We begin by introducing a conceptual framework for true broadcasting and illustrate its design with a secure key broadcast scheme based on probabilistic encryption. The framework provides for a system requiring user anonymity, as a result of the absence of addressing for the broadcast message. We also illustrate how Shamir’s threshold scheme can be altered to allow for parallel broadcasting. We then present a formal model and use information theoretic techniques to establish a lower bound on the size of the broadcast message for a class of true broadcast schemes. Finally, we improve upon the aforementioned threshold scheme such that it achieves the lower bound.
Original languageEnglish
Title of host publicationProceedings of the 2nd ACM Conference on Computer & Communications Security
EditorsDorothy Denning
Place of PublicationNew York (New York)
PublisherAssociation for Computing Machinery
Pages81-88
Number of pages8
ISBN (Print)9780897917322
DOIs
Publication statusPublished - Nov 1994
Event2nd ACM Conference on Computer & Communications Security - Fairfax, United States
Duration: 2 Nov 19944 Nov 1994

Publication series

NameProceedings of the ACM Conferences
PublisherAssociation for Computer Machinery
Volume2

Conference

Conference2nd ACM Conference on Computer & Communications Security
CountryUnited States
CityFairfax
Period2/11/944/11/94

Fingerprint Dive into the research topics of 'On key distribution via true broadcasting'. Together they form a unique fingerprint.

  • Cite this

    Just, M., Kranakis, E., Krizanc, D., & Van Oorschot, P. (1994). On key distribution via true broadcasting. In D. Denning (Ed.), Proceedings of the 2nd ACM Conference on Computer & Communications Security (pp. 81-88). (Proceedings of the ACM Conferences; Vol. 2). Association for Computing Machinery. https://doi.org/10.1145/191177.191195