Presentation 2008-05-16
Coalition Resistant Ternary Subset Difference Method
Kazuhide FUKUSHIMA, Shinsaku KIYOMOTO, Toshiaki TANAKA, Kouichi SAKURAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) This paper discusses an a-array subset difference method (SD method) with the resistance against coalition attacks. We can improve the security of our previous a-array SD method by the proposed scheme. In order to achieve a coalition resistant ternary array SD method, we design a new label assignment algorithm. The new label assignment algorithm and the encryption algorithm are required to revoke one or two of three subsets simultaneously while keeping the resistance against coalition attacks. We realize the two-way revocation mechanism by creatively using the original and hashed values of labels. Then, we show quantitative analyses of the efficiency and security of the ternary array SD method. We show that the upper bound of the average message size in the ternary SD methods is smaller about 12.2 percent than that of the conventional SD method, and the number of labels on each client device can be reduced about 20.4 percent. On the other hand, the computational cost imposed on a client device stays within O(log n). Finally, we demonstrate a security proof that the ternary SD method is secure against coalition attacks.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Broadcast Encryption / Subset Difference Method / Ternary Tree
Paper # ISEC2008-5
Date of Issue

Conference Information
Committee ISEC
Conference Date 2008/5/9(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Coalition Resistant Ternary Subset Difference Method
Sub Title (in English)
Keyword(1) Broadcast Encryption
Keyword(2) Subset Difference Method
Keyword(3) Ternary Tree
1st Author's Name Kazuhide FUKUSHIMA
1st Author's Affiliation KDDI R&D Laboratories, Inc.()
2nd Author's Name Shinsaku KIYOMOTO
2nd Author's Affiliation KDDI R&D Laboratories, Inc.
3rd Author's Name Toshiaki TANAKA
3rd Author's Affiliation KDDI R&D Laboratories, Inc.
4th Author's Name Kouichi SAKURAI
4th Author's Affiliation Department of Computer Science and Communication Engineering, Kyushu University
Date 2008-05-16
Paper # ISEC2008-5
Volume (vol) vol.108
Number (no) 38
Page pp.pp.-
#Pages 8
Date of Issue