2002
DOI: 10.1007/3-540-36178-2_27
|View full text |Cite
|
Sign up to set email alerts
|

A Revocation Scheme with Minimal Storage at Receivers

Abstract: Abstract. A revocation or a broadcast encryption technology allows a sender to transmit information securely over a broadcast channel to a select group of receivers excluding some revoked receivers. In this paper we propose two efficient revocation methods which are suitable for stateless receivers. The proposed methods use an a-ary key tree structure and require at most r log (N/r) log a + 1 ciphertexts broadcast. Our Method 1 requires only one key to be stored and O 2 a log 5 N log a computational overhead a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
50
0

Year Published

2005
2005
2006
2006

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 50 publications
(57 citation statements)
references
References 23 publications
1
50
0
Order By: Relevance
“…Almost all subset-cover broadcast encryption schemes based on PRSG (or one-way function) or RSA accumulator in the literature can be rewritten as instantiations in our paradigms. In fact, [18,14,17,4,12,20,15] can be viewed as PRSG-instantiated schemes and [2,3,11] are non-trapdoor-RSA-instantiated schemes from our frameworks.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Almost all subset-cover broadcast encryption schemes based on PRSG (or one-way function) or RSA accumulator in the literature can be rewritten as instantiations in our paradigms. In fact, [18,14,17,4,12,20,15] can be viewed as PRSG-instantiated schemes and [2,3,11] are non-trapdoor-RSA-instantiated schemes from our frameworks.…”
Section: Discussionmentioning
confidence: 99%
“…In this paper, we characterize the two orthogonal components in general. We then explicitly present three generic sub-frameworks for computational key derivation component (generic as arbitrary set systems are ap- 2kr ≤ log n + 1 -O(n 1/k ) RSA Accumulator -based ↓ Asano [2] O(r log a ( n r )+r) 1 O(2 a log 5 a n) O(2 a log 2 a n) The main issue is that we characterize three sub-frameworks so that such instantiations in these frameworks and their resulting efficiencies will depend solely on properties related to graph decompositions of the set systems being instantiated; while in the same time the security will be guaranteed automatically from the general frameworks. The PRSG based framework will be based on tree decomposition, and the two RSA based frameworks will be based on chain decomposition; both are purely combinatorial.…”
Section: Our Contributionsmentioning
confidence: 99%
See 3 more Smart Citations