This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Secure Broadcasting Using the Secure Lock
August 1989 (vol. 15 no. 8)
pp. 929-934

The authors discuss secure broadcasting, effected by means of a secure lock, on broadcast channels, such as satellite, radio, etc. This lock is implemented by using the Chinese Remainder theorem (CRT). The secure lock offers the following advantages: only one copy of the ciphertext is sent; the deciphering operation is efficient; and the number of secret keys held by each user is minimized. Protocols for secure broadcasting using the secure lock, based on the public-key cryptosystem as well as the private-key cryptosystem, are presented.

[1] A. V. Aho, J. E. Hopcroft, and J. D. Ullman,The Design and Analysis of Computer Algorithms. Menlo Park, CA: Addison-Wesley, 1974.
[2] D.E. Denning,Cryptography and Data Security, Addison-Wesley Publishing Co., Reading, Mass., 1982.
[3] I. S. Gopal and J. M. Jaffe, "Point-to-multipoint communication over broadcast links,"IEEE Trans. Commun., vol. COM-32, no. 9, pp. 1034-1044, 1984.
[4] A. S. Tanenbaum,Computer Networks, Englewood Cliffs, NJ: Prentice-Hall, 1981.
[5] F. J. Taylor, "Residue arithmetic: A tutorial with examples,"Computer, pp. 50-62, May 1984.

Index Terms:
secure broadcasting protocols; secret key minimization; session key; secure broadcasting; secure lock; broadcast channels; satellite; radio; Chinese Remainder theorem; ciphertext; deciphering operation; secret keys; public-key cryptosystem; private-key cryptosystem; broadcasting; cryptography; protocols; telecommunication channels
Citation:
Guang-Huei Chiou, Wen-Tsuen Chen, "Secure Broadcasting Using the Secure Lock," IEEE Transactions on Software Engineering, vol. 15, no. 8, pp. 929-934, Aug. 1989, doi:10.1109/32.31350
Usage of this product signifies your acceptance of the Terms of Use.