TY - GEN
T1 - Recipient revocable broadcast encryption with dealership
AU - Kim, Joon Sik
AU - Lee, Youngkyung
AU - Eom, Jieun
AU - Lee, Dong Hoon
N1 - Funding Information:
This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2015-0-00320, A study of a public-key authentication framework for internet entities with hierarchical identities).
Publisher Copyright:
© Springer International Publishing AG, part of Springer Nature 2018.
PY - 2018
Y1 - 2018
N2 - The broadcast encryption with dealership (BED) scheme allows a dealer, instead of a broadcaster, to manage a recipient. Unlike prior broadcast encryption schemes, BED reduces the burden placed on the broadcaster to manage recipient, which makes it suitable for a broadcasting service targeting a large number of recipients. Subscribing and unsubscribing from the broadcast service occur frequently at the request of the user, however, early versions of BED schemes do not support recipient revocation. In this paper, we propose a recipient revocable broadcast encryption with dealership and show that it is secure in the adaptive security model without random oracles.
AB - The broadcast encryption with dealership (BED) scheme allows a dealer, instead of a broadcaster, to manage a recipient. Unlike prior broadcast encryption schemes, BED reduces the burden placed on the broadcaster to manage recipient, which makes it suitable for a broadcasting service targeting a large number of recipients. Subscribing and unsubscribing from the broadcast service occur frequently at the request of the user, however, early versions of BED schemes do not support recipient revocation. In this paper, we propose a recipient revocable broadcast encryption with dealership and show that it is secure in the adaptive security model without random oracles.
KW - Adaptive security
KW - Broadcast encryption with dealership
KW - Chosen plaintext attack
KW - Revocation
UR - http://www.scopus.com/inward/record.url?scp=85044460977&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-78556-1_12
DO - 10.1007/978-3-319-78556-1_12
M3 - Conference contribution
AN - SCOPUS:85044460977
SN - 9783319785554
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 214
EP - 228
BT - Information Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers
A2 - Kim, Dong-Chan
A2 - Kim, Howon
PB - Springer Verlag
T2 - 20th International Conference on Information Security and Cryptology, ICISC 2017
Y2 - 29 November 2017 through 1 December 2017
ER -