Recipient revocable broadcast encryption with dealership

Joon Sik Kim, Youngkyung Lee, Jieun Eom, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The broadcast encryption with dealership (BED) scheme allows a dealer, instead of a broadcaster, to manage a recipient. Unlike prior broadcast encryption schemes, BED reduces the burden placed on the broadcaster to manage recipient, which makes it suitable for a broadcasting service targeting a large number of recipients. Subscribing and unsubscribing from the broadcast service occur frequently at the request of the user, however, early versions of BED schemes do not support recipient revocation. In this paper, we propose a recipient revocable broadcast encryption with dealership and show that it is secure in the adaptive security model without random oracles.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers
PublisherSpringer Verlag
Pages214-228
Number of pages15
ISBN (Print)9783319785554
DOIs
Publication statusPublished - 2018 Jan 1
Event20th International Conference on International Conference on Information Security and Cryptology, ICISC 2017 - Seoul, Korea, Republic of
Duration: 2017 Nov 292017 Dec 1

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10779 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other20th International Conference on International Conference on Information Security and Cryptology, ICISC 2017
CountryKorea, Republic of
CitySeoul
Period17/11/2917/12/1

Keywords

  • Adaptive security
  • Broadcast encryption with dealership
  • Chosen plaintext attack
  • Revocation

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Recipient revocable broadcast encryption with dealership'. Together they form a unique fingerprint.

  • Cite this

    Kim, J. S., Lee, Y., Eom, J., & Lee, D. H. (2018). Recipient revocable broadcast encryption with dealership. In Information Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers (pp. 214-228). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10779 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-78556-1_12