Compound Secure Groupcast: Key Assignment for Selected Broadcasting

被引:3
|
作者
Sun H. [1 ]
机构
[1] University of North Texas, Department of Electrical Engineering, Denton, 76203, TX
关键词
broadcast bandwidth; key storage; Secure groupcast; selected broadcasting;
D O I
10.1109/JSAIT.2022.3180889
中图分类号
学科分类号
摘要
The compound secure groupcast problem is considered, where the key variables at K receivers are designed so that a transmitter can securely groupcast a message to any N out of the K receivers through a noiseless broadcast channel. The metric is the information theoretic tradeoff between key storage, i.e., the number of bits of the key variable stored at each receiver per message bit, and broadcast bandwidth, i.e., the number of bits of the broadcast information sent by the transmitter per message bit. We have three main results. First, when broadcast bandwidth is minimized, i.e., when = 1 , we show that the minimum key storage is = N. Second, when key storage is minimized, i.e., when = 1, we show that broadcast bandwidth = (N, K-N+1) is achievable and is optimal (minimum) if N=2 or K-1. Third, when N=2 , the optimal key storage and broadcast bandwidth tradeoff is characterized as + 3,1,1. © 2020 IEEE.
引用
收藏
页码:379 / 389
页数:10
相关论文
共 50 条
  • [31] Secure broadcasting in large networks
    Sun, HM
    Shieh, SP
    COMPUTER COMMUNICATIONS, 1998, 21 (03) : 279 - 283
  • [32] Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control
    Wu, Tsu-Yang
    Zhou, Chengxiang
    Chen, Chien-Ming
    Wang, Eric Ke
    Pan, Jeng-Shyang
    MULTIDISCIPLINARY SOCIAL NETWORKS RESEARCH, MISNC 2014, 2014, 473 : 437 - 444
  • [33] Towards time-bound hierarchical key assignment for secure data access control
    Wu, Tsu-Yang (wutsuyang@gmail.com), 1600, Springer Verlag (473):
  • [34] Secure broadcasting over fading channels
    Khisti, Ashish
    Tchamkerten, Aslan
    Wornell, Gregory W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2453 - 2469
  • [35] Secure broadcasting using the secure quantum lock in noisy environments
    Guo, Ying
    Zeng, Guihua
    Mao, Yun
    ADVANCES IN NATURAL COMPUTATION, PT 2, 2006, 4222 : 41 - 44
  • [36] Secure Broadcasting Using Multiple Antennas
    Ekrem, Ersen
    Ulukus, Sennur
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2010, 12 (05) : 411 - 432
  • [37] Secure Broadcasting : The secrecy Rate Region
    Bagherikaram, Ghadamali
    Motahari, Abolfazl S.
    Khandani, Amir K.
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 834 - 841
  • [38] Exploring Secure Communication in VANET Broadcasting
    Jafer, Muhammad
    Khan, M. Arif
    Rehman, Sabih Ur
    Zia, Tanveer A.
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 69 - 84
  • [39] A Secure Solution for Ubiquitous Multimedia Broadcasting
    Lian, Shiguo
    Dong, Yuan
    Wang, Haila
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 753 - 757
  • [40] Collaborative Relay Beamforming for Secure Broadcasting
    Zhang, Junwei
    Gursoy, Mustafa Cenk
    2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,