Anonymous trace and revoke


AK M., Pehlivanoğlu S., Selcuk A. A.

JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, vol.259, pp.586-591, 2014 (SCI-Expanded) identifier identifier

  • Publication Type: Article / Article
  • Volume: 259
  • Publication Date: 2014
  • Doi Number: 10.1016/j.cam.2013.10.019
  • Journal Name: JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS
  • Journal Indexes: Science Citation Index Expanded (SCI-EXPANDED), Scopus
  • Page Numbers: pp.586-591
  • Keywords: Digital content distribution, Digital rights management, Broadcast encryption, Trace and revoke, Anonymity, Privacy
  • Akdeniz University Affiliated: Yes

Abstract

A broadcast encryption (BE) scheme is a method for encrypting messages in a way that only a set of privileged users can decrypt it. Anonymity in a BE system is to hide any information on the privileged set. This problem has very recently had some attention and some constructions are proposed to achieve anonymity. However, anonymity in a trace and revoke (TR) scheme has not been studied yet, and to the best of our knowledge there is no construction for an anonymous TR system. In this paper, we present a generic transformation from an anonymous BE scheme into an anonymous TR scheme.

A broadcast encryption (BE) scheme is a method for encrypting messages in a way that only a set of privileged users can decrypt it. Anonymity in a BE system is to hide any information on the privileged set. This problem has very recently had some attention and some constructions are proposed to achieve anonymity. However, anonymity in a trace and revoke (TR) scheme has not been studied yet, and to the best of our knowledge there is no construction for an anonymous TR system. In this paper, we present a generic transformation from an anonymous BE scheme into an anonymous TR scheme. (C) 2013 Elsevier B.V. All rights reserved.