Abstract
The Broadcast Encryption methods, often referred to as revocation schemes, allow data to be efficiently broadcast to a dynamically changing group of users. A special case is when the receivers are stateless [2,1]. Naor et al. [2] propose the Complete Subset Method (CSM) and the Subset Difference Method (SDM). Asano [1] puts forth two other methods, AM1 and AM2, which use public prime parameters to generate the decryption keys. The efficiency of broadcast encryption methods is measured by three parameters: (i) message size - the number of transmitted ciphertexts; (ii) storage at receiver - the number of private keys each receiver is required to store; and (iii) key derivation time - the computational overhead needed to access the decryption keys.
Original language | English |
---|---|
Title of host publication | Data and Applications Security XXI |
Subtitle of host publication | 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings |
Editors | Steve Barker, Gail-Joon Ahn |
Place of Publication | Berlin |
Publisher | Springer |
Pages | 95-97 |
Number of pages | 3 |
ISBN (Electronic) | 978-3-540-73538-0 |
ISBN (Print) | 978-3-540-73533-5 |
DOIs | |
Publication status | Published - Jul 2007 |
Event | 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2007 - Redondo Beach, United States Duration: 8 Jul 2007 → 8 Jul 2007 Conference number: 21 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 4602 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2007 |
---|---|
Abbreviated title | DBSec |
Country/Territory | United States |
City | Redondo Beach |
Period | 8/07/07 → 8/07/07 |
Keywords
- 2025 OA procedure