Computer Security - ESORICS 2014
Volume 8713 of the series Lecture Notes in Computer Science pp 1-18
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
- Kwangsu LeeAffiliated withCIST, Korea University
- , Woo Kwon KooAffiliated withCIST, Korea University
- , Dong Hoon LeeAffiliated withCIST, Korea University
- , Jong Hwan ParkAffiliated withSangmyung University
Abstract
Broadcast encryption is a very powerful primitive since it can send an encrypted message to a set of users excluding a set of revoked users. Public-key broadcast encryption (PKBE) is a special type of broadcast encryption such that anyone can run the encryption algorithm to create an encrypted message by using a public key. In this paper, we propose a new technique to construct an efficient PKBE scheme by using the subset cover framework. First, we introduce a new concept of public-key encryption named single revocation encryption (SRE) and propose an efficient SRE scheme in the random oracle model. A user in SRE is represented as a group that he belongs and a member in the group. In SRE, a sender can create a ciphertext for a specified group where one member in the group is revoked, and a receiver can decrypt the ciphertext if he belongs to the group in the ciphertext and he is not revoked in the group. Second, we show that the subset difference (SD) scheme (or the layered subset difference (LSD) scheme) and an SRE scheme can be combined to construct a public-key revocation encryption (PKRE) scheme such that a set of revoked users is specified in a ciphertext. Our PKRE scheme using the LSD scheme and our SRE scheme can reduce the size of private keys and public keys by logN factor compared with the previous scheme of Dodis and Fazio.
Keywords
Public-key encryption Broadcast encryption Traitor tracing Trace and revoke Bilinear maps- Title
- Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
- Book Title
- Computer Security - ESORICS 2014
- Book Subtitle
- 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
- Pages
- pp 1-18
- Copyright
- 2014
- DOI
- 10.1007/978-3-319-11212-1_1
- Print ISBN
- 978-3-319-11211-4
- Online ISBN
- 978-3-319-11212-1
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 8713
- Series ISSN
- 0302-9743
- Publisher
- Springer International Publishing
- Copyright Holder
- Springer International Publishing Switzerland
- Additional Links
- Topics
- Keywords
-
- Public-key encryption
- Broadcast encryption
- Traitor tracing
- Trace and revoke
- Bilinear maps
- Industry Sectors
- eBook Packages
- Editors
-
-
Mirosław Kutyłowski
(15)
-
Jaideep Vaidya
(16)
-
Mirosław Kutyłowski
- Editor Affiliations
-
- 15. Department of Fundamental Problems of Technology, Wrocław University of Technology
- 16. MSIS Department, Rutgers University
- Authors
-
-
Kwangsu Lee
(17)
-
Woo Kwon Koo
(17)
-
Dong Hoon Lee
(17)
-
Jong Hwan Park
(18)
-
Kwangsu Lee
- Author Affiliations
-
- 17. CIST, Korea University, Korea
- 18. Sangmyung University, Korea
Continue reading...
To view the rest of this content please follow the download PDF link above.