A revocation scheme with minimal storage at receivers

56Citations
Citations of this article
35Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A revocation or a broadcast encryption technology allows a sender to transmit information securely over a broadcast channel to a select group of receivers excluding some revoked receivers. In this paper we propose two efficient revocation methods which are suitable for stateless receivers. The proposed methods use an a-ary key tree structure and require at most r _ log (N/r) log a + 1 _ ciphertexts broadcast. Our Method 1 requires only one key to be stored and O _ 2alog5N log a _ computational overhead at a receiver, whereas Method 2 requires logN log a keys and O (2a) computational overhead, where N and r respectively denote the total number of receivers and the number of revoked receivers. Our methods are very efficient with respect to the number of keys each receiver stores, especially Method 1 minimizes it.

Cite

CITATION STYLE

APA

Asano, T. (2002). A revocation scheme with minimal storage at receivers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2501, pp. 433–450). Springer Verlag. https://doi.org/10.1007/3-540-36178-2_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free