Anonymous trace and revoke


AK M., Pehlivanoğlu S., Selcuk A. A.

JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, cilt.259, ss.586-591, 2014 (SCI-Expanded) identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 259
  • Basım Tarihi: 2014
  • Doi Numarası: 10.1016/j.cam.2013.10.019
  • Dergi Adı: JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus
  • Sayfa Sayıları: ss.586-591
  • Anahtar Kelimeler: Digital content distribution, Digital rights management, Broadcast encryption, Trace and revoke, Anonymity, Privacy
  • Akdeniz Üniversitesi Adresli: Evet

Özet

A broadcast encryption (BE) scheme is a method for encrypting messages in a way that only a set of privileged users can decrypt it. Anonymity in a BE system is to hide any information on the privileged set. This problem has very recently had some attention and some constructions are proposed to achieve anonymity. However, anonymity in a trace and revoke (TR) scheme has not been studied yet, and to the best of our knowledge there is no construction for an anonymous TR system. In this paper, we present a generic transformation from an anonymous BE scheme into an anonymous TR scheme. (C) 2013 Elsevier B.V. All rights reserved.

A broadcast encryption (BE) scheme is a method for encrypting messages in a way that only a set of privileged users can decrypt it. Anonymity in a BE system is to hide any information on the privileged set. This problem has very recently had some attention and some constructions are proposed to achieve anonymity. However, anonymity in a trace and revoke (TR) scheme has not been studied yet, and to the best of our knowledge there is no construction for an anonymous TR system. In this paper, we present a generic transformation from an anonymous BE scheme into an anonymous TR scheme.