2003
DOI: 10.1007/978-3-540-40061-5_23
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack

Abstract: Abstract. We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. Fazio [9]. Our scheme reduces the length of enabling block of the DF scheme by (about) half. Additionally, the computational overhead of the user is lower than that of the DF scheme; instead, the computational overhead of the server is increased. The total computational overhead of the user and the server is the same as that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
10
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 22 publications
1
10
0
Order By: Relevance
“…Since it is often distributing information of its own choice, it is assumed to have control over the group membership, i.e., the center is allowed to make decisions about who can join the group and whose membership should be revoked. This is in line with almost all multicast schemes such as [25,4,26,27,22,23,24].…”
Section: Preliminariessupporting
confidence: 85%
See 4 more Smart Citations
“…Since it is often distributing information of its own choice, it is assumed to have control over the group membership, i.e., the center is allowed to make decisions about who can join the group and whose membership should be revoked. This is in line with almost all multicast schemes such as [25,4,26,27,22,23,24].…”
Section: Preliminariessupporting
confidence: 85%
“…This gives her a chance to "protect" these shares and, as a result, the resulting multicast encryption can be made more secure than T D. This can be seen as an extension of Construction 1: This construction can be used to build a multicast scheme with higher security than the underlying threshold scheme. This is essentially what was done in [23] and [24]. The protection mechanism (i.e.…”
Section: Extension To Constructionmentioning
confidence: 80%
See 3 more Smart Citations