Presentation | 2003/3/19 Comparison of Performance on Subset-Cover Revocation Schemes Seiji OKUAKI, Santoso BAGUS, Kazuo OHTA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | A stateless key revocation is one of the key management technologies that is able to revoke pirated terminals using the prestored keys without updating keys. Many schemes are included in the framework of the Subset-Cover Revocation. The most promising schemes are COmplete Subtree (CS) Method, Subset Difference (SD) Method, Layered Subset Difference (LSD) Method and Hybrid System (HS) Method. In this paper, we estimate the performance of these schemes based on the number of device keys and the message length. Our result shows that the CS method is the best scheme from the standpoint of the number of device keys and the SD method is the best scheme that of the length of message. We also confirm that the LSD scheme and the HS(CS+SD) scheme can reduce both the number of device keys and the length of messages simultaneously. Finally we propose the procedure to decide the design parameter of the HS(CS+SD) scheme in order to attain better performance than the LSD scheme. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Broadcast Encryption / Revocation Scheme / Subset-Cover Revocation / Complete Subtree Method / Subset Difference Method / Hybrid System |
Paper # | IT2002-62,ISEC2002-120,SST2002-168,ITS2002-145 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2003/3/19(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Comparison of Performance on Subset-Cover Revocation Schemes |
Sub Title (in English) | |
Keyword(1) | Broadcast Encryption |
Keyword(2) | Revocation Scheme |
Keyword(3) | Subset-Cover Revocation |
Keyword(4) | Complete Subtree Method |
Keyword(5) | Subset Difference Method |
Keyword(6) | Hybrid System |
1st Author's Name | Seiji OKUAKI |
1st Author's Affiliation | Department of Industorial Information System Engineering, Tokyo Institute, Polytechnic University() |
2nd Author's Name | Santoso BAGUS |
2nd Author's Affiliation | Department of Information and Communication Engineering, The University of Electro-Communications |
3rd Author's Name | Kazuo OHTA |
3rd Author's Affiliation | Department of Information and COmmunication Engineering, The University of Electro-Communications |
Date | 2003/3/19 |
Paper # | IT2002-62,ISEC2002-120,SST2002-168,ITS2002-145 |
Volume (vol) | vol.102 |
Number (no) | 743 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |