Revocation and tracing based on ternary tree: Towards optimal broadcast encryption scheme

Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper proposes a broadcast encryption scheme with traitor tracing based on the ternary tree structure. The subset difference method with ternary tree reduces the communication cost and tracing cost of the original method with the binary tree. However, straightforward expansion of the method ends in failure due to the vulnerability to coalition attacks. Thus, we design a new cover-finding algorithm and label assignment algorithm in order to achieve a coalition-resistant revocation and tracing schemes. Our analysis on efficiency and security shows that our scheme is an improvement of the existing broadcast encryption schemes: complete subtree and subset difference methods.

Original languageEnglish
Title of host publicationE-Business and Telecommunications
Subtitle of host publicationInternational Joint Conference, ICETE 2011 Seville, Spain, July 18-21, 2011 Revised Selected Papers
EditorsJose L. Sevillano, Joaquim Filipe
Pages233-248
Number of pages16
DOIs
Publication statusPublished - Dec 1 2012
Event8th International Joint Conference on e-Business and Telecommunications, ICETE 2011 - Seville, Spain
Duration: Jul 18 2011Jul 21 2011

Publication series

NameCommunications in Computer and Information Science
Volume314
ISSN (Print)1865-0929

Other

Other8th International Joint Conference on e-Business and Telecommunications, ICETE 2011
CountrySpain
CitySeville
Period7/18/117/21/11

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Mathematics(all)

Fingerprint Dive into the research topics of 'Revocation and tracing based on ternary tree: Towards optimal broadcast encryption scheme'. Together they form a unique fingerprint.

Cite this