Multiple Key Distribution Maintaining User Anonymity via Broadcast ...

0 downloads 0 Views 209KB Size Report
Jul 25, 1995 - users to recover di erent keys from the broadcast message. ... security. From the point of view of security, most networks can be thought.
Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels C. Blundo Dipartimento di Informatica ed Applicazioni Universita di Salerno 84081 Baronissi (SA), Italy Luiz A. Frota Mattos CEPESC/SAE  SAISw Area 5, Quadra 1, Bloco V 70610 Brasilia, DF, Brazil D. R. Stinson Department of Computer Science and Engineering and Center for Communication and Information Science University of Nebraska-Lincoln Lincoln NE 68588, USA July 25, 1995

Abstract In this paper, we discuss methods by which a trusted authority can broadcast a message over a network, so that each member of a speci ed privileged subset of users can decrypt this message to compute a secret key. In contrast with previously constructed schemes, it is possible for the di erent privileged users to recover di erent keys from the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on any the keys they are not supposed to know. The schemes also do not require addressing, so user anonymity is maintained. The problem is studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption). Some useful schemes are presented and compared to previously known schemes.

1 Introduction Key distribution is one of the major problems in communication and network security. From the point of view of security, most networks can be thought of as broadcast networks, in that anyone connected to the network will have access to all the information that ows through it. This leads to many problems related to the con dentiality and authenticity of information that is transmitted through the network. Encryption is often employed in a network to protect the con dentiality of information. If a conventional private-key cryptosystem, such as DES, is used, then it is necessary to distribute keys to the network users in a secure fashion. Usually, this is done by an on-line key server. (For an overview of key distribution techniques see [12].) In this paper, we investigate how key distribution can be accomplished in a broadcast setting. We assume that network is a broadcast channel, i.e., it is insecure, and any information transmitted by any user will be received by every user. In other words, we do not assume the existence of private channels between pairs of users. This makes problems such as key distribution more dicult. On the other hand, it allows the possibility of user anonymity (described below), which might be desirable in certain situations. These and other properties will be considered in the remainder of the paper. In our model, we assume that there is a trusted authority (TA), who will broadcast a message over the network in such a way that a speci ed privileged subset of participants will be able to decrypt the message. The decrypted message may be a session (conference) key, for use by the privileged subset, or it may be intended for some other purpose. In a local area network, for example, the clients are workstations while the TA is a server. The clients requesting various services may have di erent hierarchical levels. This may require that various keys be distributed to speci c subsets of clients for di erent purposes. The methods we discuss in this paper also have some other useful properties. Among these, the most important is user anonymity. This means that the broadcast message does not contain an explicit address, so a nonprivileged user does not learn the identities of the privileged users. Moreover, each privileged user need only know that he or she is a member of the privileged subset to be able to decrypt the broadcast message (the identities of the other privileged users do not need to be known). Among other things, this feature provides security against trac- ow analysis. 1

The problem of distributing keys to speci ed privileged subsets via broadcast messages has been previously studied by several authors; see, for example, [1, 3, 7, 8].

2 The Model for Broadcast Key Distribution Our model for key distribution consists of the trusted authority (TA) and a set of users. We assume that network is a broadcast channel, i.e., it is insecure, and any information transmitted by the TA will be received by every user. In a set-up stage, the TA generates and distributes secret information to each user. Let us assume that the set of users is denoted by U = f1; 2; : : : ; ng. The information given to user i is denoted by ui and must be distributed \o band" (i.e., not using the network) in a secure manner. At a later time, the TA will want to broadcast a message to a privileged subset P  U . The particular privileged subset P is, in general, not known ahead of time. For 1  i  n, let Ui denote the set of all possible secret values that might be distributed to user i by the TA. For any subset of users X  U , let UX denote the cartesian product Ui1  : : :  Ui , where X = fi1 ; : : : ; ij g and i1 <    < ij . We assume that there is a probability distribution on UU , and the TA chooses uU 2 UU according to this probability distribution. Similarly, for 1  i  n, let Ki denote the set of possible keys that might be broadcast to user i, and de ne KX analogously to UX for a subset of users X . (In the schemes we discuss, we will assume that all key sets K1; : : : ; Kn are the same, so K1 =    = Kn = K , say.) Let 2 U denote the set of all subsets of users. P  2 U will denote the collection of all privileged subsets to which the TA might want to broadcast keys. F  2 U will denote the collection of all possible coalitions (called forbidden subsets) against which a broadcast is to remain secure. Now, suppose that the TA wants to broadcast keys to a given privileged set P 2 P . We assume that there is a probability distribution on KP , and the TA chooses a jP j-tuple of keys kP 2 KP according to this probability distribution. Then the broadcast message bP (which is an element of a speci ed set of messages BP ) is computed as a function of kP and uP . Once the message bP is broadcast, each user i 2 P should be able to compute their key ki. (We are implicitly assuming that each user i 2 P j

2

knows that he or she is to be a recipient of the broadcast. Again, this will generally be established o -band, since the broadcast itself contains no addressing information and does not identify the intended recipients.) Now we consider the security that we would like such a scheme to attain. Any forbidden set F 2 F should not be able to compute any information other than what should be revealed to the privileged users in F (namely, the keys ki, i 2 P \ F ), and the information that can then be inferred from the probability distribution on KP concerning the keys ki, i 2 P nF . We describe the desired properties mathematically using the entropy function1. We discuss the security in terms of a single broadcast, so we call the scheme \one-time". (Of course, the problem can also be investigated in the setting of computational security. We are using the information-theoretic setting here because it provides the highest possible level of security and because we feel that it clari es some of the underlying concepts and principles.) We say that the scheme is a One-Time Broadcast Multiple Key Distribution Scheme (or OTBMKD scheme) provided the following conditions are satis ed: (C1) Without knowing the broadcast message, no subset of users has any information about kP , even given all the secret information UU : H (KP jUU ) = H (KP ) for all P 2 P . (C2) The key for a privileged user is uniquely determined by the broadcast message and the user's secret information: H (KijUiBP ) = 0 for all P 2 P and i 2 P . (C3) After receiving the broadcast message, no forbidden subset F has any information on kP beyond what is revealed to them by knowledge of kP \F : H (KP jKF \P ) = H (KP jUF BP ) for all P 2 P and F 2 F . 1

For de nitions and properties of information theoretic quantities, that is, the entropy

H (X ), the mutual information I (X ; Y ), and the respective conditional measures, that we

will use in this paper we refer to [10].

3

Here are two special cases that are of interest: If every user in a privileged set receives the same (conference) key, which is chosen at random from K , we have that H (KP ) = log jK j. In this case, condition (C3) reduces to

H (KP ) = H (KP jUF BP ) for all P 2 P and F 2 F such that P \ F = ;. (Note that condition (C3) implies that

H (KP jKF \P ) = H (KP jUF BP ) = 0

if P \ F 6= ;.) We will call this situation the equal keys case. At the opposite extreme, if all the keys given to the members of the privileged set P are independent and chosen at random from K , then H (KP ) = jP j log jK j. In this case, which we call the independent keys case, condition (C3) reduces to H (KP jUF BP ) = jP nF j log jK j for all P 2 P and F 2 F . Such a setting would be useful, for example, in broadcasting shares in a secret sharing scheme (see [11] for an overview of secret sharing schemes). Recently, Blundo and Cresti [3] and Just, Kranakis, Krizanc and van Oorschot [8] considered similar problems. The de nitions given by Blundo and Cresti involve multiple broadcasts, and were con ned to the equal keys case. If their de nitions are modi ed to the one-time scenario, then they are equivalent to what we described above in the equal keys case. The de nitions given by Just, Kranakis, Krizanc and van Oorschot are also concerned with the equal keys case. They include some extra conditions, such as the users' secret information being independent, which are not really necessary in a one-time scheme. The rest of their conditions are essentially the same as our conditions restricted to the equal keys case. Further discussion and comparison of di erent schemes will be given in Section 5.

3 Constructions for Key Distribution Schemes In this section, we present a secure OTMBKD scheme satisfying the model of Section 2, which provides user anonymity (and which does not require addressing information). Our rst scheme is related to the method of Just et 4

al. [8], which was in turn a re nement of the scheme of Berkovits [1]. These schemes are all based on polynomial interpolation. Our second scheme make uses of the Fourier Transform and is more ecient computationally in the situation where there is only one privileged set consisting of all n users. Both schemes also provide for user anonymity.

3.1 The Polynomial Interpolation Scheme

In this scheme, the set of privileged subsets, P , consists of all subsets of t users, where t  n is xed. Any subset of users can be a forbidden set, i.e., F = 2U. The Polynomial Interpolation Scheme is constructed as follows: 1. For each user i, the TA chooses an ordered pair (xi; yi) 2 Zp  Zp, where p  n is prime and xi 6= xj if i 6= j . The values x1 ; : : : ; xn are public; but y1; : : : ; yn should be chosen independently at random by the TA. Then ui = yi is the secret information given to user i (1  i  n). 2. Suppose the TA wishes to broadcast the key t-tuple kP = (ki1 ; : : : ; ki ) 2 (Zp)t ; where P = fi1 ; : : : ; itg. (This t-tuple is chosen according to a speci ed, but arbitrary, probability distribution.) For 1  j  t, the TA computes aj = ki + yi mod p: 3. By polynomial interpolation, the TA constructs the unique polynomial f (x) 2 Zp[x] of degree at most t ? 1 such that f (xi ) = aj for 1  j  t. 4. Suppose t?1 f (x) = j xj : t

j

j

j

X

j =0

Then the TA broadcasts the vector of coecients bP = ( 0; :::; t?1 ): 5

5. Each privileged user ij (1  j  t) can compute the secret key ki as j

ki = f (xi ) ? yi mod p: j

j

j

It is obvious that the scheme satis es conditions (C1) and (C2). That (C3) is also satis ed follows easily from the fact that the t values yi1 ; : : : ; yi were chosen independently at random from Zp. t

Notice also that each privileged user does not need to know the identities of the other privileged users in order to perform the key computation. Furthermore, the broadcast itself does not yield any information to a forbidden set F about the identities of the privileged users in P nF . So we have a very strong form of user anonymity in this scheme, which we consider to be desirable. (Note that if we do not require user anonymity, then the same thing can be accomplished simply by encrypting each key separately, attaching a user identi er (i.e., an address) to each encrypted key, and concatenating the results.) In later sections we will study lower bounds on the size of the broadcast and the amount of secret information held by each user. Mathematically, these quantities are measured by H (BP ) and H (Ui) (1  i  n). For the above scheme, we have H (BP ) = t log p and H (Ui) = log p, (1  i  n). In a later section, we will show that these entropies are as small as possible, at least in the case of independent keys.

3.2 The Fourier Transform Scheme

The Fourier Transform scheme can be thought of as a special case of the Polynomial Interpolation Scheme. It can be applied when t = n, i.e., when there is only one privileged set consisting of all n participants. We also require that the prime p be chosen such that p  1 mod n. Let be an element in Zp having order n. The value of is publicly known. The Fourier Transform scheme incorporates the following modi cations: Steps 1. and 2. are the same as before, except that each xi = i mod p. Then the TA can compute the bP as the inverse Fourier transform of (a1 ; : : : ; an). The remainder of the protocol is unchanged.

6

4 Information-theoretic Bounds

In this section we obtain lower bounds on H (BP ) and H (Ui) (1  i  n), and other measures of the information content of an OTMBKD scheme. Some of these bounds are similar to bounds obtained in [2, 8]. The lower bounds we establish are of interest in considering the optimality of various schemes, from the point of view of the amount of users' secret information and the size of the broadcast. We will use several elementary results on information theory without proof; see [10], for example.

Lemma 4.1 In any OTMBKD scheme, H (KP jUP BP ) = 0 for all P 2 P . Proof. Let P = fi1 ; : : : ; ij g. Then we have the following: H (KP jUP BP ) = H (Ki1 Ki2 : : : Ki jUP BP ) j X  H (Ki jUP BP ) j

=



h

h=1 j

X H (Ki jUi Ui : : : Ui BP ) h=1 Xj H (Ki jUi BP )

h=1

h

1

h

h

2

j

= 0;

by condition (C2). Of course H (KP jUP BP )  0, so the lemma follows.

Lemma 4.2 In any OTMBKD scheme, H (BP jUU )  H (KP ) for all P 2 P . Proof. Consider the mutual information I (BP ; KP jUU ). We have that I (BP ; KP jUU ) = H (BP jUU ) ? H (BP jUU KP ): On the other hand,

I (BP ; KP jUU ) = H (KP jUU ) ? H (KP jUU BP ) = H (KP ); 7

since

H (KP jUU BP )  H (KP jUP BP ) = 0; by Lemma 4.1. Hence, H (BP jUU )  H (KP ).

Corollary 4.3 In any OTMBKD scheme, H (BP )  H (BP jUP )  H (KP ) for all P 2 P . Proof. H (BP )  H (BP jUP )  H (BP jUU ). Apply Lemma 4.2. Theorem 4.4 In any OTMBKD scheme, H (UP jUF )  H (KP ) for all P 2 P and F 2 F such that P \ F = ;. Proof. Applying condition (C3 ), we have H (KP ) = H (KP jUF BP ) = H (UP jUF BP ) ? H (UP jUF BP KP ) + H (KP jUF BP UP ): From Lemma 4.1, we have 0  H (KP jUF BP UP )  H (KP jBP UP ) = 0; so Since also the result follows.

H (KP )  H (UP jUF BP ): H (UP jUF BP )  H (UP jUF );

Corollary 4.5 In any OTMBKD scheme, H (UP )  H (KP ) for all P 2 P . Proof. H (UP )  H (UP jUF ). Apply Theorem 4.4.

8

Theorem 4.6 In any OTMBKD scheme, H (UP UF )  H (KP ) + H (KF ) for all P 2 P and F 2 F \ P such that P \ F = ;. Proof. We have

H (UP UF ) = H (UF ) + H (UP jUF )  H (KF ) + H (KP ); where we apply Corollary 4.5 (using the fact that F 2 P ) and Theorem 4.4. At this point we have obtained lower bounds on H (BP ) and H (UP ) for any privileged set P 2 P . It is also interesting to derive a lower bound on the joint entropy H (BP UP ). We proceed to do this now.

Theorem 4.7 In any OTMBKD scheme, H (UP BP )  2H (KP ) for all P 2 P. Proof. We have the following:

H (UP BP ) = H (UP ) + H (BP jUP )  H (KP ) + H (KP ) = 2H (KP ); from Corollaries 4.5 and 4.3. The above bound is true for any OTMBKD scheme. For some speci c cases of P and F of interest, we can sometimes prove stronger bounds.

Theorem 4.8 Suppose we have an OTMBKD scheme where P consists of all t-subsets of U and F = 2 U . Denote ` = bn=tc, and let P1 ; : : : ; P` be ` disjoint t-subsets of U . Then ` X H (UP : : : UP )  H (KP ): 1

`

j =1

Proof. For 1  j  ` ? 1 we have that

P1 [ : : : [ P j 2 F ; 9

j

and hence

H (UP +1 jUP1 : : : UP )  H (KP +1 ) by Theorem 4.4. Also, H (UP1 )  H (K1) by Corollary 4.5. Now, we have j

j

H (UP1 : : : UP ) = H (UP1 ) + `



j

X`?1 H (UP

j =1

X` H (Kj);

j

+1

jUP1 : : : UP ) j

j =1

as desired. Now we are in a position to obtain a lower bound on the total entropy H (UU BP ) for certain schemes. This quantity can be thought of as a measure of the total randomness of the scheme. To formally de ne the total randomness of the scheme we use the Shannon entropy of the random variables generating the information distributed to the users. The entropy is strictly related to the measure of randomness introduced by Knuth and Yao [9]. Indeed, let A be an algorithm that generates the probability distribution Q = (q1; : : : ; qn), using only independent and unbiased random bits in inputs. Denote by T (A) the average number of random bits used by the algorithm A and let T (Q) = minA T (A). Knuth and Yao [9] proved the following theorem.

Theorem 4.9

H (Q)  T (Q) < H (Q) + 2:

Thus, the entropy of a random source is very close to the average number of independent unbiased random bits necessary to simulate the source. Randomness of cryptographic protocols has been studied recently by several authors; see [4, 5, 6], for example.

Theorem 4.10 Suppose we have an OTMBKD scheme where P consists of all t-subsets of U and F = 2 U . Suppose that n  0 mod t, and suppose that H (KP ) = t log p for all P 2 P , where K = Zp (i.e., we have independent keys). Then

for any P 2 P .

H (UU BP )  (n + t) log p 10

Proof. Let ` = n=t and let P1; : : : ; P` be ` disjoint t-subsets of U . Apply Theorem 4.8, to obtain

H (UU )  `  t log p = n log p: Now, we have Since

H (UU BP ) = H (UU ) + H (BP jUU ): H (BP jUU )  H (KP ) = t log p

by Lemma 4.2, the result follows.

Theorem 4.11 Suppose we have an OTMBKD scheme where P = fP  U : jP j  tg and

F = fP  U : jP j  t0g;

where t  t0 and t + t0  n. Suppose that H (KP ) = t log p for all P 2 P , where K = Zp (i.e., we have independent keys). Then

H (UU BP )  (2t + t0 ) log p for any P 2 P such that jP j = t. Proof. Let jP j = t, jF j = t0 and P \ F = ;. Then P 2 P and F 2 F \ P . Apply Theorem 4.6, to obtain

H (UP UF )  H (KP ) + H (KF ) = (t + t0) log p: Now, we have

H (UU BP ) = H (UU ) + H (BP jUU )  H (UP UF ) + H (BP jUU ): Since

H (BP jUU )  H (KP ) = t log p

by Lemma 4.2, the result follows.

11

5 Schemes Meeting the Bounds In this section, we discuss schemes that meet the various bounds of Section 4 with equality. As well, we compare our schemes to schemes previously studied in the literature.

5.1 Schemes for Independent Keys

Let us rst consider the Polynomial Interpolation Scheme with independent keys chosen from a key set Zp. In this case, we have

H (Ui) H (BP ) H (KP ) H (UU ) H (UU BP )

= = = = =

log p (1  i  n); t log p; t log p; n log p; and (n + t) log p:

This scheme meets many of the bounds of Section 4 with equality, including Corollaries 4.3 and 4.5. Further, Theorems 4.8 and 4.10 are met with equality if n  0 mod t. In this situation, the scheme is optimal with respect to the amount of secret information, the size of the broadcast, and the total randomness. The Polynomial Interpolation Scheme is optimal with respect to total randomness under the assumption that

P = fP  U : jP j = tg and F = 2 U . Note that the scheme can in fact be used to distribute keys to privileged sets of any size t1  t if f is instead chosen to be a polynomial of degree t1 ? 1. In other words, the scheme can accommodate the situation

P = fP  U : jP j  tg: For this choice of P , Theorem 4.11 gives a lower bound on the total randomness in the case where

F = fP  U : jP j  t0g; 12

t  t0 and t + t0  n. It is in fact possible to modify the Polynomial Interpolation Scheme, reducing the total randomness to meet the bound of Theorem 4.11 with equality, for this choice of F . The only thing that changes is Step 1. Suppose that the TA chooses t + t0 points yi (1  i  t + t0) at random (note that t + t0  n). Then the TA constructs the polynomial g(x) of degree t + t0 ? 1 such that g(xi) = yi (1  i  t + t0 ) by polynomial interpolation. Then, for t + t0 + 1  i  n, yi is de ned to be g(xi). It can be shown that the modi ed scheme is still a OTMBKD scheme; the details are left to the reader. With this modi cation, we have H (Ui) = log p (1  i  n), H (BP ) = t log p, and H (KP ) = t log p (as before). However, now H (UU ) = (t + t0) log p and H (UU BP ) = (2t + t0) log p. The bound of Theorem 4.11 is met with equality.

5.2 Schemes for Equal Keys

As mentioned earlier, the equal keys case has been studied most in the literature. We present a couple of schemes for purposes of comparison with our scheme. The following scheme of Just, Kranakis, Krizanc and van Oorschot is presented in Section 5.1 of [8]: 1. For each user i, the TA chooses an ordered pair (xi ; yi) 2 Zp  Zp, where p  n is prime, xi 6= xj if i 6= j , and xi 6= 0 for all i. The values x1 ; : : : ; xn are public; but y1; : : : ; yn should be chosen independently at random by the TA. Then ui = yi is the secret information given to user i (1  i  n). 2. Suppose the TA wishes to broadcast the key

kP 2 Zp to P = fi1 ; : : : ; itg. By polynomial interpolation, the TA constructs the unique polynomial f (x) 2 Zp[x] of degree at most t such that

f (xi ) = yi j

for 1  j  t, and f (0) = kP . 13

j

3. Suppose

f (x) =

Xt j xj :

j =0

Then the TA broadcasts the vector of coecients (excluding 0 = kP ) bP = ( 1 ; :::; t): 4. Each privileged user ij (1  j  t) can compute the secret key kP as t X kP = yi ? hxi h mod p: j

h=1

j

This scheme has the same amount of secret information, broadcast size and total randomness as our Polynomial Interpolation Scheme, but accommodates only the case of equal keys. However, it is shown in [8] that this scheme is optimal with respect to the size of the broadcast, under the additional assumption that the secret information held by the users is mutually independent (i.e., if H (UijU1 : : : Ui?1Ui+1 : : : Un) = H (Ui) for 1  i  n). Thus, if we wish to obtain a smaller size broadcast in the equal keys setting, the users' secret information cannot be mutually independent. We illustrate that this can in fact be accomplished by using a simple scheme of Fiat and Naor [7]. This scheme will deal with the case where P = 2U and F = fF  U : jF j = 1g: It works as follows: 1. For each user i, the TA chooses an element yi 2 Zp. The values y1; : : : ; yn should be chosen independently at random by the TA. Then ui = (y1; : : : ; yi?1; yi+1; : : : ; yn) is the secret information given to user i (1  i  n). 14

2. Suppose the TA wishes to broadcast the key

kP 2 Zp

to P = fi1; : : : ; it g. The TA broadcasts the value

bP = kP +

X

h6=i1 ;:::;it

yh mod p:

3. Each privileged user ij (1  j  t) can compute the secret key kP as

kP = bP ?

X

h6=i1 ;:::;it

yh mod p:

Remark: This scheme is not anonymous, since each privileged user needs

to know the identities of the other privileged users in order to decrypt the broadcast. As compared to the schemes studied earlier, we have a smaller size broadcast, but more secret information must be stored by each user. The information in this scheme is as follows: H (Ui) = (n ? 1) log p (1  i  n); H (BP ) = log p; H (KP ) = log p; H (UU ) = n log p and H (UU BP ) = (n + 1) log p: Further, H (UijUj ) = log p for all i 6= j . The scheme is optimal with respect to Corollary 4.3. As well, the bound of Theorem 4.4 is met with equality if jP j = 1. But we do not know if this scheme is optimal with respect to total randomness, for example.

Acknowledgements This research was done while the second author was visiting the Computer Science and Engineering Department at the University of Nebraska. He would like to thank the department for their hospitality. 15

Research of C. Blundo is partially supported by Italian Ministry of University and Scienti c Research (M.U.R.S.T.) in the framework of the project: \Algoritmi, Modelli di Calcolo e Strutture Informative" and by National Council of Research (C.N.R.); research of Luiz Frota Mattos is partially supported by the National Council of Scienti c and Technological Development (CNPq), Brazil, under grant 260030/94-5; and research of D. R. Stinson is supported by NSF grant CCR{9402141.

References [1] S. Berkovits, How to Broadcast a Secret. In Advances in Cryptology | EUROCRYPT '91, Springer-Verlag, Berlin, 1991, pp. 536{541. [2] C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, Perfectly Secure Key Distribution for Dynamic Conferences. In Advances in Cryptology | CRYPTO '92, Springer-Verlag, Berlin, 1993, pp. 471{486. [3] C. Blundo and A. Cresti, Space Requirements for Broadcast Encryption. In Advances in Cryptology | EUROCRYPT '94, Springer-Verlag, Berlin, 1995. [4] C. Blundo, A. De Santis and U. Vaccaro, Randomness in Distribution Protocols. In Automata, Languages and Programming | ICALP '94, Springer-Verlag, Berlin, 1994, pp. 568{579. [5] C. Blundo, A. Giorgio Gaggia and D. R. Stinson, On the Dealer's Randomness Required in Secret Sharing Schemes. In Advances in Cryptology | EUROCRYPT '94, Springer-Verlag, Berlin, 1995. [6] C. Blundo, A. De Santis, G. Persiano and U. Vaccaro, On the Number of Random Bits in Totally Private Computation, To appear in Automata, Languages and Programming | ICALP '95, Springer-Verlag, Berlin. [7] A. Fiat and M. Naor, Broadcast Encryption. In Advances in Cryptology | CRYPTO '93, Springer-Verlag, Berlin, 1994, pp. 480{491.

16

[8] M. Just, E. Kranakis, D. Krizanc and P. van Oorschot, On Key Distribution via True Broadcasting. In Proc. 2nd ACM Conf. on Computer and Communications Security, 1994, pp. 81{88. [9] D. E. Knuth and A. C. Yao, The Complexity of Nonuniform Random Number Generation. Algorithms and Complexity, J.F. Traub Ed., Academic Press, (1976), 357{428. [10] F. M. Reza, An Introduction to Information Theory. Dover, New York, 1994. [11] D. R. Stinson, An Explication of Secret Sharing Schemes. Designs, Codes and Cryptography 2 (1992), 357{390. [12] D. R. Stinson, Cryptography Theory and Practice. CRC Press, Inc., Boca Raton, 1995.

17

Suggest Documents