2001
DOI: 10.1007/3-540-44647-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Revocation and Tracing Schemes for Stateless Receivers

Abstract: Abstract. We deal with the problem of a center sending a message to a group of users such that some subset of the users is considered revoked and should not be able to obtain the content of the message. We concentrate on the stateless receiver case, where the users do not (necessarily) update their state from session to session. We present a framework called the Subset-Cover framework, which abstracts a variety of revocation schemes including some previously known ones. We provide sufficient conditions that gu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
970
0
6

Year Published

2005
2005
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 799 publications
(1,004 citation statements)
references
References 27 publications
2
970
0
6
Order By: Relevance
“…In the general subset-cover paradigm of [18], which includes almost all of the above schemes, it has been implicitly understood that one can separate the design of such a scheme into two seemingly orthogonal problems namely: designing combinatorial set system which enables subset covering (this step determines the header size), and defining computational key derivation (this step determines the private key size and computational cost). This is first explicitly characterized by Gentry-Ramzan [11] for the case of Akl-Taylor's RSA based key derivation [1].…”
Section: Our Contributionsmentioning
confidence: 99%
See 4 more Smart Citations
“…In the general subset-cover paradigm of [18], which includes almost all of the above schemes, it has been implicitly understood that one can separate the design of such a scheme into two seemingly orthogonal problems namely: designing combinatorial set system which enables subset covering (this step determines the header size), and defining computational key derivation (this step determines the private key size and computational cost). This is first explicitly characterized by Gentry-Ramzan [11] for the case of Akl-Taylor's RSA based key derivation [1].…”
Section: Our Contributionsmentioning
confidence: 99%
“…We refer to [18] for the definitions and the security notions for private-key broadcast encryption. Now we recap the subset-cover framework [18] separately into two components as follows.…”
Section: Frameworkmentioning
confidence: 99%
See 3 more Smart Citations