The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers

Anna Zych, Milan Petković, Willem Jonker

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Downloads (Pure)

Abstract

The Broadcast Encryption methods, often referred to as revocation schemes, allow data to be efficiently broadcast to a dynamically changing group of users. A special case is when the receivers are stateless [2,1]. Naor et al. [2] propose the Complete Subset Method (CSM) and the Subset Difference Method (SDM). Asano [1] puts forth two other methods, AM1 and AM2, which use public prime parameters to generate the decryption keys. The efficiency of broadcast encryption methods is measured by three parameters: (i) message size - the number of transmitted ciphertexts; (ii) storage at receiver - the number of private keys each receiver is required to store; and (iii) key derivation time - the computational overhead needed to access the decryption keys.
Original languageEnglish
Title of host publicationData and Applications Security XXI
Subtitle of host publication21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings
EditorsSteve Barker, Gail-Joon Ahn
Place of PublicationBerlin
PublisherSpringer
Pages95-97
Number of pages3
ISBN (Electronic)978-3-540-73538-0
ISBN (Print)978-3-540-73533-5
DOIs
Publication statusPublished - Jul 2007
Event21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2007 - Redondo Beach, United States
Duration: 8 Jul 20078 Jul 2007
Conference number: 21

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume4602
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2007
Abbreviated titleDBSec
Country/TerritoryUnited States
CityRedondo Beach
Period8/07/078/07/07

Keywords

  • 2025 OA procedure

Fingerprint

Dive into the research topics of 'The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers'. Together they form a unique fingerprint.

Cite this