J. KIMS Technol Search

CLOSE


J. KIMS Technol > Volume 17(3); 2014 > Article
Journal of the Korea Institute of Military Science and Technology 2014;17(3):358-363.
DOI: https://doi.org/10.9766/KIMST.2014.17.3.358   
Two Attribute-based Broadcast Encryption Algorithms based on the Binary Tree
Moon Sik Lee, HongTae Kim, Jeoung Dae Hong
1Faculty, Korea Air Force Academy
2Defense Security Command
이진트리 기반의 속성기반 암호전송 알고리즘
이문식, 김홍태, 홍정대
1공군사관학교
2국군기무사령부
Abstract
In this paper, we present two constructions of the attribute-based broadcast encryption(ABBE) algorithm. Attribute-based encryption(ABE) algorithm enables an access control mechanism over encrypted data by specifying access policies among private keys and ciphertexts. ABBE algorithm can be used to construct ABE algorithm with revocation mechanism. Revocation has a useful property that revocation can be done without affecting any non-revoked uers. The main difference between our algorithm and the classical ones derived from the complete subtree paradigm which is apt for military hierarchy. Our algorithm improve the efficiency from the previously best ABBE algorithm, in particular, our algorithm allows one to select or revoke users by sending ciphertext of constant size with respect to the number of attributes and by storing logarithm secret key size of the number of users. Therefore, our algorithm can be an option to applications where computation cost is a top priority and can be applied to military technologies in the near future.
Key Words: Cryptography, Attribute-based Encryption, Broadcast Encryption, Binary Tree
TOOLS
Share :
Facebook Twitter Linked In Google+ Line it
METRICS Graph View
  • 0 Crossref
  •    
  • 537 View
  • 1 Download
Related articles in J. KIMS Technol.


ABOUT
ARTICLE CATEGORY

Browse all articles >

BROWSE ARTICLES
FOR CONTRIBUTORS
Editorial Office
160 Bugyuseong-daero 488beon-gil, Yuseong-gu, Daejeon 34060, Korea
Tel: +82-42-823-4603    Fax: +82-42-823-4605    E-mail: kimst@kimst.or.kr                

Copyright © 2024 by The Korea Institute of Military Science and Technology.

Developed in M2PI

Close layer
prev next