TY - GEN
T1 - Towards optimal revocation and tracing schemes - The power of the ternary tree
AU - Fukushima, Kazuhide
AU - Kiyomoto, Shinsaku
AU - Miyake, Yutaka
AU - Sakurai, Kouichi
PY - 2011
Y1 - 2011
N2 - Digital content distribution services require that 1) only valid user devices that has a valid key can decrypt the broadcasting content, 2) the keys can no longer be used to decrypt the content, if keys in a device are revealed, and 3) invalid users who illegally use keys in a device can be identified. This paper proposes a broadcast encryption scheme with traitor tracing based on the ternary tree structure. We design a new cover-finding algorithm and label assignment algorithm in order to achieve a coalition-resistant revocation and tracing schemes. In our scheme, the number of labels stored in a client device can be reduced by about 20.4 percent and the average header length by up to 15.0 percent in the case where the total number of devices is 65,536. The efficiency of the traitor tracing is the same as the complete subtree method, and its computational cost imposed on a client device stays within O(logn). Our scheme is an improvement of the complete subtree and difference subset methods.
AB - Digital content distribution services require that 1) only valid user devices that has a valid key can decrypt the broadcasting content, 2) the keys can no longer be used to decrypt the content, if keys in a device are revealed, and 3) invalid users who illegally use keys in a device can be identified. This paper proposes a broadcast encryption scheme with traitor tracing based on the ternary tree structure. We design a new cover-finding algorithm and label assignment algorithm in order to achieve a coalition-resistant revocation and tracing schemes. In our scheme, the number of labels stored in a client device can be reduced by about 20.4 percent and the average header length by up to 15.0 percent in the case where the total number of devices is 65,536. The efficiency of the traitor tracing is the same as the complete subtree method, and its computational cost imposed on a client device stays within O(logn). Our scheme is an improvement of the complete subtree and difference subset methods.
UR - http://www.scopus.com/inward/record.url?scp=80052481035&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80052481035&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:80052481035
SN - 9789898425713
T3 - SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography
SP - 37
EP - 49
BT - SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography
T2 - International Conference on Security and Cryptography, SECRYPT 2011
Y2 - 18 July 2011 through 21 July 2011
ER -