Efficient Public Trace and Revoke from Standard Assumptions
- Submitting institution
-
The University of Kent
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 20344
- Type
- E - Conference contribution
- DOI
-
10.1145/3133956.3134041
- Title of conference / published proceedings
- Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
- First page
- 2277
- Volume
- -
- Issue
- -
- ISSN
- 1543-7221
- Open access status
- Technical exception
- Month of publication
- October
- Year of publication
- 2017
- URL
-
https://kar.kent.ac.uk/83284/
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
4
- Research group(s)
-
-
- Citation count
- 5
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- Public-key broadcast encryption schemes (used in pay-TV etc.) with the capability of tracing and revoking pirated decryption keys are notoriously difficult to construct with only two previously existing schemes. This paper is significant because we discovered a generic way in which inner product functional encryption schemes could be elegantly transformed into trace-and-revoke schemes. This allows for a variety of such schemes to be developed, and we describe three in detail in the paper. They have the significant advantage over previous work of allowing tracing by untrusted parties. One of our schemes is secure against quantum attacks.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -