2005
DOI: 10.1007/11593447_6
|View full text |Cite
|
Sign up to set email alerts
|

Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations

Abstract: Abstract. We present generic frameworks for constructing efficient broadcast encryption schemes in the subset-cover paradigm, introduced by Naor et.al., based on various key derivation techniques. Our frameworks characterize any instantiation completely to its underlying graph decompositions, which are purely combinatorial in nature. This abstracts away the security of each instantiated scheme to be guaranteed by the generic one of the frameworks; thus, gives flexibilities in designing schemes. Behind these ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2006
2006
2008
2008

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…Tree-based schemes usually use balanced binary tree or n-ary(n > 2) tree to organize users' subsets, and assigns subset keys following "Subset Cover" [5] concept. Those schemes include Complete Subtree(CS) scheme [5], Subset Difference(SD)scheme [5], Layered Subset Difference(LSD) [6] scheme, Stratified Subset Difference(SSD) scheme [7], Graph Decomposition scheme [8], RSA accumulator-based scheme [9][10] [11] and so on.Chainbased schemes use hash chain to organize users' subsets and keys. Their subset deduction procedure always can be seen as forming an interval from a line.…”
Section: A Related Workmentioning
confidence: 99%
“…Tree-based schemes usually use balanced binary tree or n-ary(n > 2) tree to organize users' subsets, and assigns subset keys following "Subset Cover" [5] concept. Those schemes include Complete Subtree(CS) scheme [5], Subset Difference(SD)scheme [5], Layered Subset Difference(LSD) [6] scheme, Stratified Subset Difference(SSD) scheme [7], Graph Decomposition scheme [8], RSA accumulator-based scheme [9][10] [11] and so on.Chainbased schemes use hash chain to organize users' subsets and keys. Their subset deduction procedure always can be seen as forming an interval from a line.…”
Section: A Related Workmentioning
confidence: 99%
“…3 The only constraint is that hdr = hdr if either ID = ID or ID is a prefix of ID . In both cases, C responds as in Phase 1.…”
Section: Phasementioning
confidence: 99%
“…The previously best schemes [20,19,18], along the line of the subset-cover paradigm by Naor, Naor, and Lotspiech (NNL) [20], can only achieve a broadcast ciphertext of size O(r) with each user's private key being of size O(log n), where r = n − |S| is the number of revoked users. Although these schemes are improved in [3] by reducing the private key size to O (1), the ciphertext is still of size O(r). 1 These NNL derivatives are originally private-key schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Without considering the time of scanning the header to find out his containing subset, each user needs to perform 2 modular exponentiations and 3 pairing functions. Thus, the decryption cost is O (1).…”
Section: Basic Pbe-sd-pi Schemementioning
confidence: 99%
“…with the same probability 1 Similarly, we can modify our PBE-SD-PI scheme to have IND-CCA security like Section 4…”
Section: Let Gmentioning
confidence: 99%