Abstract
The Broadcast Encryption methods, often referred to as revocation schemes, allow data to be efficiently broadcast to a dynamically changing group of users. A special case is when the receivers are stateless [2,1]. Naor et al. [2] propose the Complete Subset Method (CSM) and the Subset Difference Method (SDM). Asano [1] puts forth two other methods, AM1 and AM2, which use public prime parameters to generate the decryption keys. The efficiency of broadcast encryption methods is measured by three parameters: (i) message size - the number of transmitted ciphertexts; (ii) storage at receiver - the number of private keys each receiver is required to store; and (iii) key derivation time - the computational overhead needed to access the decryption keys.
| Original language | English |
|---|---|
| Title of host publication | Data and Applications Security XXI |
| Subtitle of host publication | 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings |
| Editors | Steve Barker, Gail-Joon Ahn |
| Place of Publication | Berlin |
| Publisher | Springer |
| Pages | 95-97 |
| Number of pages | 3 |
| ISBN (Electronic) | 978-3-540-73538-0 |
| ISBN (Print) | 978-3-540-73533-5 |
| DOIs | |
| Publication status | Published - Jul 2007 |
| Event | 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2007 - Redondo Beach, United States Duration: 8 Jul 2007 → 8 Jul 2007 Conference number: 21 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Publisher | Springer |
| Volume | 4602 |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2007 |
|---|---|
| Abbreviated title | DBSec |
| Country/Territory | United States |
| City | Redondo Beach |
| Period | 8/07/07 → 8/07/07 |
Keywords
- 2025 OA procedure