loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Kazuhide Fukushima 1 ; Shinsaku Kiyomoto 1 ; Yutaka Miyake 1 and Kouichi Sakurai 2

Affiliations: 1 KDDI R&D Laboratories Inc., Japan ; 2 Kyushu University, Japan

Keyword(s): Broadcast encryption, Subset difference method, Traitor tracing, Ternary tree.

Related Ontology Subjects/Areas/Topics: Data Engineering ; Data Management and Quality ; Digital Rights Management ; Information and Systems Security

Abstract: Digital content distribution services require that 1) only valid user devices that has a valid key can decrypt the broadcasting content, 2) the keys can no longer be used to decrypt the content, if keys in a device are revealed, and 3) invalid users who illegally use keys in a device can be identified. This paper proposes a broadcast encryption scheme with traitor tracing based on the ternary tree structure. We design a new cover-finding algorithm and label assignment algorithm in order to achieve a coalition-resistant revocation and tracing schemes. In our scheme, the number of labels stored in a client device can be reduced by about 20.4 percent and the average header length by up to 15.0 percent in the case where the total number of devices is 65,536. The efficiency of the traitor tracing is the same as the complete subtree method, and its computational cost imposed on a client device stays within O(logn). Our scheme is an improvement of the complete subtree and difference subset methods. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 44.202.90.91

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Fukushima, K.; Kiyomoto, S.; Miyake, Y. and Sakurai, K. (2011). TOWARDS OPTIMAL REVOCATION AND TRACING SCHEMES - The Power of the Ternary Tree. In Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT; ISBN 978-989-8425-71-3; ISSN 2184-3236, SciTePress, pages 37-49. DOI: 10.5220/0003447100370049

@conference{secrypt11,
author={Kazuhide Fukushima. and Shinsaku Kiyomoto. and Yutaka Miyake. and Kouichi Sakurai.},
title={TOWARDS OPTIMAL REVOCATION AND TRACING SCHEMES - The Power of the Ternary Tree},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT},
year={2011},
pages={37-49},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003447100370049},
isbn={978-989-8425-71-3},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT
TI - TOWARDS OPTIMAL REVOCATION AND TRACING SCHEMES - The Power of the Ternary Tree
SN - 978-989-8425-71-3
IS - 2184-3236
AU - Fukushima, K.
AU - Kiyomoto, S.
AU - Miyake, Y.
AU - Sakurai, K.
PY - 2011
SP - 37
EP - 49
DO - 10.5220/0003447100370049
PB - SciTePress