[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Secure Broadcasting Using the Secure Lock

Published: 01 August 1989 Publication History

Abstract

The authors discuss secure broadcasting, effected by means of a secure lock, on broadcast channels, such as satellite, radio, etc. This lock is implemented by using the Chinese Remainder theorem (CRT). The secure lock offers the following advantages: only one copy of the ciphertext is sent; the deciphering operation is efficient; and the number of secret keys held by each user is minimized. Protocols for secure broadcasting using the secure lock, based on the public-key cryptosystem as well as the private-key cryptosystem, are presented.

References

[1]
{1} A. V. Aho, J. E. Hopcroft, and J. D. Ullman, The Design and Analysis of Computer Algorithms. Reading, MA: Addison-Wesley, 1974.
[2]
{2} D. E. Denning, Cryptography and Data Security. Reading, MA: Addison-Wesley, 1982.
[3]
{3} I. S. Gopal and J. M. Jaffe, "Point-to-multipoint communication over broadcast links," IEEE Trans. Commun., vol. COM-32, no. 9, pp. 1034-1044, 1984.
[4]
{4} A. S. Tanenbaum, Computer Nerworks. Englewood Cliffs, NJ: Prentice-Hall, 1981.
[5]
{5} F. J. Taylor, "Residue arithmetic: A tutorial with examples," Computer , pp. 50-62, May 1984.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Software Engineering
IEEE Transactions on Software Engineering  Volume 15, Issue 8
August 1989
92 pages
ISSN:0098-5589
Issue’s Table of Contents

Publisher

IEEE Press

Publication History

Published: 01 August 1989

Author Tags

  1. Chinese Remainder theorem
  2. broadcast channels
  3. broadcasting
  4. ciphertext
  5. cryptography
  6. deciphering operation
  7. private-key cryptosystem
  8. protocols
  9. public-key cryptosystem
  10. radio
  11. satellite
  12. secret key minimization
  13. secret keys
  14. secure broadcasting
  15. secure broadcasting protocols
  16. secure lock
  17. session key
  18. telecommunication channels

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Research on Self-Adaptive Group Key Management in Deep Space NetworksWireless Personal Communications: An International Journal10.1007/s11277-020-07540-7114:4(3435-3456)Online publication date: 1-Oct-2020
  • (2018)Efficient Group Key Management for Non-reliable Link NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4956-y98:2(1955-1973)Online publication date: 1-Jan-2018
  • (2018)An image encryption algorithm based on irregular wave representationMultimedia Tools and Applications10.1007/s11042-017-4455-x77:2(2611-2628)Online publication date: 1-Jan-2018
  • (2017)Computation-efficient key establishment in wireless group communicationsWireless Networks10.1007/s11276-016-1223-123:1(289-297)Online publication date: 1-Jan-2017
  • (2016)DBMask: Fine-Grained Access Control on Encrypted Relational DatabasesTransactions on Data Privacy10.5555/3121413.31214149:3(187-214)Online publication date: 1-Dec-2016
  • (2015)DBMaskProceedings of the 5th ACM Conference on Data and Application Security and Privacy10.1145/2699026.2699101(1-11)Online publication date: 2-Mar-2015
  • (2015)A parallel algorithm for secure multicastThe Journal of Supercomputing10.1007/s11227-014-1336-171:5(1803-1816)Online publication date: 1-May-2015
  • (2015)Analyses of several recently proposed group key management schemesSecurity and Communication Networks10.1002/sec.9668:2(136-148)Online publication date: 25-Jan-2015
  • (2014)Identity-based broadcast encryption for multi-privileged groups using Chinese remainder theoremInternational Journal of Information and Computer Security10.1504/IJICS.2014.0666616:3(286-305)Online publication date: 1-Dec-2014
  • (2014)Quantum state secure transmission in network communicationsInformation Sciences: an International Journal10.1016/j.ins.2013.12.034276:C(363-376)Online publication date: 20-Aug-2014
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media