Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Fully Collusion-Resistant Trace-and-Revoke Scheme in Prime-Order Groups

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Jong Hwan-
dc.contributor.authorRhee, Hyun Sook-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-07T08:00:20Z-
dc.date.available2021-09-07T08:00:20Z-
dc.date.created2021-06-18-
dc.date.issued2011-10-
dc.identifier.issn1229-2370-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/111524-
dc.description.abstractA trace-and-revoke scheme is a type of broadcast encryption scheme for content protection on various platforms such as pay-per-view TV and DVD players. In 2006, Boneh and Waters (BW) presented a fully collusion-resistant trace-and-revoke scheme. However, a decisive drawback of their scheme is to require composite-order groups. In this paper, we present a new trace-and-revoke scheme that works in prime-order groups. Our scheme is fully collusion-resistant and achieves ciphertexts and private keys of size O(root N) for N users. For the same level of security, our scheme is better than the BW scheme in all aspects of efficiency. Some superior features include 8.5 times faster encryption, 12 times faster decryption, and 3.4 times shorter ciphertexts. To achieve our goal, we introduce a novel technique where, by using asymmetric bilinear maps in prime-order groups, the cancellation effect same as in composite-order groups can be obtained.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherKOREAN INST COMMUNICATIONS SCIENCES (K I C S)-
dc.subjectBROADCAST ENCRYPTION-
dc.subjectSHORT CIPHERTEXTS-
dc.titleFully Collusion-Resistant Trace-and-Revoke Scheme in Prime-Order Groups-
dc.typeArticle-
dc.contributor.affiliatedAuthorPark, Jong Hwan-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1109/JCN.2011.6112299-
dc.identifier.scopusid2-s2.0-81555211953-
dc.identifier.wosid000296998100002-
dc.identifier.bibliographicCitationJOURNAL OF COMMUNICATIONS AND NETWORKS, v.13, no.5, pp.428 - 441-
dc.relation.isPartOfJOURNAL OF COMMUNICATIONS AND NETWORKS-
dc.citation.titleJOURNAL OF COMMUNICATIONS AND NETWORKS-
dc.citation.volume13-
dc.citation.number5-
dc.citation.startPage428-
dc.citation.endPage441-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.identifier.kciidART001604302-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusBROADCAST ENCRYPTION-
dc.subject.keywordPlusSHORT CIPHERTEXTS-
dc.subject.keywordAuthorBilinear maps-
dc.subject.keywordAuthorbroadcast encryption-
dc.subject.keywordAuthorcontent distribution system-
dc.subject.keywordAuthortrace-and-revoke scheme-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE