Title :
An Unconditionally Secure Multi-round Revocation Scheme Using Secret Sharing
Author_Institution :
Dept. of Comput. Sci., PLA Univ. of Sci. & Technol., Nanjing
Abstract :
The revocation schemes are usually used for broadcast encryption and multicast key management. We present a Shamir´s polynomial secret sharing based revocation 2 scheme that enable many revocation rounds and has t2 revocation capability in each round. Our scheme has some notable properties as compared with the other precious schemes: (1) Our multi-round revocation scheme is unconditionally secure other than computationally secure; (2) Our scheme 2 promotes the revocation capability from t users to t2 users in every round, and is secure against any coalition of all the revoked users. (3) Each user only restores the constant personal keys during the whole session, and the overhead of computation and communication is only dependant on the degree of the secret sharing polynomial regardless of the size of the group.
Keywords :
cryptography; broadcast encryption; multicast key management; polynomial secret sharing based revocation scheme; unconditionally secure multi-round revocation scheme; Broadcasting; Computer science; Cryptography; Data security; Heart; Identity-based encryption; Multicast communication; Permission; Polynomials; Streaming media; broadcast encryption; revocation scheme; secret sharing; secure multicast;
Conference_Titel :
TENCON 2005 2005 IEEE Region 10
Conference_Location :
Melbourne, Qld.
Print_ISBN :
0-7803-9311-2
Electronic_ISBN :
0-7803-9312-0
DOI :
10.1109/TENCON.2005.301003