Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time

碩士 === 國立交通大學 === 資訊科學與工程研究所 === 95 === We proposed two public-key broadcast encryption schemes. The first scheme, called the BE-PI scheme, has O( r ) header size, O( r ) computation cost, O( 1 ) public keys and O( 1 )private keys, where r is the number of revoked users and n is the number of users....

Full description

Bibliographic Details
Main Author: 劉易儒
Other Authors: 曾文貴
Format: Others
Language:en_US
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/18092313434098805613
Description
Summary:碩士 === 國立交通大學 === 資訊科學與工程研究所 === 95 === We proposed two public-key broadcast encryption schemes. The first scheme, called the BE-PI scheme, has O( r ) header size, O( r ) computation cost, O( 1 ) public keys and O( 1 )private keys, where r is the number of revoked users and n is the number of users. This is the first public-key BE(broadcast encryption) scheme that with O(logn) private keys under O( r ) header size. The other scheme, we call it PK-SD-PI scheme, has O( r ) header size, O( 1 ) public keys,O(logn^2) private keys and only O( 1 ) computation cost. By using similar technique in LSD. We can convert it to PK-LSD-PI scheme, has O( 1 ) public keys and O(logn^1+1/k) private keys with kr header size tradeoff. Using our method, it also can reduce public key size to O( 1 ) in public traitor tracing scheme. Our BE system is static full-collusion resistant secure under chosen plain attack (CPA). With little modification, it can also against chosen cipher attack (CCA).