Skip to main content
Log in

Some New Results on Key Distribution Patterns and Broadcast Encryption

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).

In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. C. H. Bennett, G. Brassard and J.-M. Robert, Privacy amplification by public discussion, SIAM J. Comput., Vol. 17 (1988) pp. 210-229.

    Google Scholar 

  2. S. Berkovits, How to broadcast a secret, In Advances in Cryptology-EUROCRYPT' 91, Springer-Verlag, Berlin (1992) pp. 536-541.

    Google Scholar 

  3. J. Bierbrauer, Construction of orthogonal arrays, Journal of Statistical Planning and Inference, Vol. 56 (1996) pp. 39-47.

    Article  Google Scholar 

  4. J. Bierbrauer, T. Johansson, G. Kabatianskii and B. Smeets, On families of hash functions via geometric codes and concatenation, In Advances in Cryptology-CRYPTO' 93, Springer-Verlag, Berlin (1994) pp. 331-342.

    Google Scholar 

  5. J. Bierbrauer, K. Gopalakrishnan and D.R. Stinson, Orthogonal arrays, resilient functions, error-correcting codes and linear programming bounds, SIAM J. Discrete Math., Vol. 9 (1996) pp. 424-452.

    Google Scholar 

  6. C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, Perfectly secure key distribution for dynamic conferences, In Advances in Cryptology-CRYPTO'92, Springer-Verlag, Berlin (1993) pp. 471-486.

    Google Scholar 

  7. B. Chor, O. Goldreich, J. Hastad, J. Friedman, S. Rudich and R. Smolensky, The bit extraction problem or t-resilient functions, In Proc. 26th IEEE Symposium on Foundations of Computer Science(1985) pp. 396- 407.

  8. C. J. Colbourn and J. H. Dinitz, eds., CRC Handbook of Combinatorial Designs, CRC Press, Inc. (1996).

  9. A. Fiat and M. Naor, Broadcast encryption, In Advances in Cryptology-CRYPTO' 93, Springer-Verlag, Berlin (1994) pp. 480-491.

    Google Scholar 

  10. K. Gopalakrishnan and D. R. Stinson, Three characterizations of non-binary correlation-immune and resilient functions, Designs, Codes and Cryptography, Vol. 5 (1995) pp. 241-251.

    Google Scholar 

  11. C. J. Mitchell and F. C. Piper, Key storage in secure networks, Discrete Applied Mathematics, Vol. 21 (1988) pp. 215-228.

    Article  Google Scholar 

  12. A. Shamir, How to share a secret, Communications of the ACM, Vol. 22 (1979) pp. 612-613.

    Article  Google Scholar 

  13. D. R. Stinson, Combinatorial designs and cryptography, In Surveys in Combinatorics, 1993, Cambridge University Press (1993) pp. 257-287.

  14. D. R. Stinson, On some methods for unconditionally secure key distribution and broadcast encryption, Designs, Codes and Cryptography, Vol. 12 (1997), pp. 215-243.

    Google Scholar 

  15. D. R. Stinson and J. L. Massey, An infinite class of counterexamples to a conjecture concerning non-linear resilient functions, Journal of Cryptology, Vol. 8 (1995) pp. 167-173.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Stinson, D.R., van Trung, T. Some New Results on Key Distribution Patterns and Broadcast Encryption. Designs, Codes and Cryptography 14, 261–279 (1998). https://doi.org/10.1023/A:1008209004667

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1008209004667

Navigation