Browse > Article
http://dx.doi.org/10.9766/KIMST.2014.17.3.358

Two Attribute-based Broadcast Encryption Algorithms based on the Binary Tree  

Lee, Moon Sik (Faculty, Korea Air Force Academy)
Kim, HongTae (Faculty, Korea Air Force Academy)
Hong, Jeoung Dae (Defense Security Command)
Publication Information
Journal of the Korea Institute of Military Science and Technology / v.17, no.3, 2014 , pp. 358-363 More about this Journal
Abstract
In this paper, we present two constructions of the attribute-based broadcast encryption(ABBE) algorithm. Attribute-based encryption(ABE) algorithm enables an access control mechanism over encrypted data by specifying access policies among private keys and ciphertexts. ABBE algorithm can be used to construct ABE algorithm with revocation mechanism. Revocation has a useful property that revocation can be done without affecting any non-revoked uers. The main difference between our algorithm and the classical ones derived from the complete subtree paradigm which is apt for military hierarchy. Our algorithm improve the efficiency from the previously best ABBE algorithm, in particular, our algorithm allows one to select or revoke users by sending ciphertext of constant size with respect to the number of attributes and by storing logarithm secret key size of the number of users. Therefore, our algorithm can be an option to applications where computation cost is a top priority and can be applied to military technologies in the near future.
Keywords
Cryptography; Attribute-based Encryption; Broadcast Encryption; Binary Tree;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Sahai and B. Waters, "Fuzzy Identity-based Encryption," Eurocrypt 2005, LNCS 3494, pp. 457-473.
2 D. Naor, M. Naor and Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Crypto 2001, LNCS 2139, pp. 41-62.
3 N. Attrapadung and H. Imai, "Conjunctive Broadcast and Attribute-based Encryption", Pairing 2009, LNCS 5671, pp. 248-265.
4 V. Goyal, O. Pandy, A. Sahai and B. Waters, "Attribute-based Encryption for Fine-grained Access Control of Encrypted Data," ACM CCS 2006, pp. 89-98.