An unconditionally secure multi-round revocation scheme using secret sharing

被引:0
作者
Yang, Ming [1 ]
机构
[1] PLA Univ Sci & Technol, Dept Comp Sci, Nanjing 210007, Peoples R China
来源
TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5 | 2006年
关键词
broadcast encryption; revocation scheme; secret sharing; secure multicast;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The revocation schemes are usually used for broadcast encryption and multicast key management. We present a Shamir's polynomial secret sharing based revocation scheme that enable many revocation rounds and has t(2) revocation capability in each round. Our scheme has some notable properties as compared with the other precious schemes: (1) Our multi-round revocation scheme is unconditionally secure other than computationally secure; (2) Our scheme promotes the revocation capability from t users to t(2) users in every round, and is secure against any coalition of all the revoked users. (3) Each user only restores the constant personal keys during the whole session, and the overhead of computation and communication is only dependant on the degree of the secret sharing polynomial regardless of the size of the group.
引用
收藏
页码:630 / 635
页数:6
相关论文
共 12 条
[1]   Key management for restricted multicast using broadcast encryption [J].
Abdalla, M ;
Shavitt, Y ;
Wool, A .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2000, 8 (04) :443-454
[2]  
AHO JH, DESIGN ANAL COMPUTER
[3]  
[Anonymous], 1994, LNCS
[4]  
Fiat A., 1994, LECT NOTES COMPUTER, V773, P480, DOI DOI 10.1007/3-540-48329-2
[5]  
KOGAN N, 2003, P 24 IEEE S SEC PRIV
[6]  
KOGAN T, IMPROVED EFFICIENCY
[7]  
Luby M, 1998, LECT NOTES COMPUT SC, V1403, P512, DOI 10.1007/BFb0054150
[8]  
NOAR D, 1998, LNCS, V2139, P41
[9]  
NOAR M, 2000, LNCS, V1962, P1
[10]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613