An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack

  • Chong Hee Kim
  • Yong Ho Hwang
  • Pil Joong Lee
Conference paper

DOI: 10.1007/978-3-540-40061-5_23

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2894)
Cite this paper as:
Kim C.H., Hwang Y.H., Lee P.J. (2003) An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. In: Laih CS. (eds) Advances in Cryptology - ASIACRYPT 2003. ASIACRYPT 2003. Lecture Notes in Computer Science, vol 2894. Springer, Berlin, Heidelberg

Abstract

We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. Fazio[9]. Our scheme reduces the length of enabling block of the DF scheme by (about) half. Additionally, the computational overhead of the user is lower than that of the DF scheme; instead, the computational overhead of the server is increased. The total computational overhead of the user and the server is the same as that of the DF scheme, and therefore, our scheme is more practical, since the computing power of the user is weaker than that of the server in many applications. In addition, our scheme is secure against adaptive chosen ciphertext attack under only the decision Diffie-Hellman (DDH) assumption and the collision-resistant hash function H assumption, whereas the DF scheme also needs the one-time MAC (message authentication code) assumption.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Chong Hee Kim
    • 1
  • Yong Ho Hwang
    • 1
  • Pil Joong Lee
    • 1
  1. 1.IS Lab, Dept. of Electronic and Electrical Eng.POSTECHKorea

Personalised recommendations