Wireless broadcast encryption based on smart cards

Yi, Xun and Batten, Lynn 2010, Wireless broadcast encryption based on smart cards, Wireless networks, vol. 16, no. 1, pp. 153-165.

Attached Files
Name Description MIMEType Size Downloads

Title Wireless broadcast encryption based on smart cards
Author(s) Yi, Xun
Batten, Lynn
Journal name Wireless networks
Volume number 16
Issue number 1
Start page 153
End page 165
Total pages 13
Publisher Springer
Place of publication New York, N.Y.
Publication date 2010-01
ISSN 1022-0038
1572-8196
Keyword(s) broadcast encryption
revocation scheme
traitor tracing
smart card
Summary Wireless broadcasting is an efficient way to broadcast data to a large number of users. Some commercial applications of wireless broadcasting, such as satellite pay-TV, desire that only those users who have paid for the service can retrieve broadcast data. This is often achieved by broadcast encryption, which allows a station securely to broadcast data to a dynamically changing set of privileged users through open air. Most existing broadcast encryption schemes can only revoke a pre-specified number of users before system re-setup or require high computation, communication and storage overheads in receivers. In this paper, we propose a new broadcast encryption scheme based on smart cards. In our scheme, smart cards are used to prevent users from leaking secret keys. Additionally, once an illegally cloned smart card is captured, our scheme also allows tracing of the compromised smart card by which illegal smart cards are cloned, and can then revoke all cloned smart cards. The new features of our scheme include minimal computation needs of only a few modular multiplications in the smart card, and the capability to revoke up to any number of users in one revocation. Furthermore, our scheme is secure against both passive and active attacks and has better performance than other schemes.
Language eng
Field of Research 080402 Data Encryption
Socio Economic Objective 890105 Satellite Communication Networks and Services
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type X Not reportable
HERDC collection year 2010
Copyright notice ©2008, Springer Science+Business Media
Persistent URL http://hdl.handle.net/10536/DRO/DU:30022591

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 2 times in TR Web of Science
Google Scholar Search Google Scholar
Access Statistics: 428 Abstract Views, 10 File Downloads  -  Detailed Statistics
Created: Tue, 19 Jan 2010, 13:53:56 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.