Revocation Systems with Very Small Private Keys

@article{Bishop2008RevocationSW,
  title={Revocation Systems with Very Small Private Keys},
  author={Allison Bishop and Amit Sahai and Brent Waters},
  journal={2010 IEEE Symposium on Security and Privacy},
  year={2008},
  pages={273-285}
}
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new "two equation" technique for revoking users. This technique results in two key contributions: First, our new scheme has ciphertext size overhead $O(r)$, where $r$ is the number of revoked users, and the size of public and private keys is only a \emph{constant} number of group elements from an elliptic-curve group of prime order. In addition, the public key… CONTINUE READING
Highly Influential
This paper has highly influenced 27 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 184 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 118 extracted citations

Attribute-based encryption schemes with constant-size ciphertexts

Theor. Comput. Sci. • 2012
View 12 Excerpts
Highly Influenced

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

IEEE Transactions on Dependable and Secure Computing • 2018
View 13 Excerpts
Highly Influenced

Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation

IACR Cryptology ePrint Archive • 2017
View 7 Excerpts
Highly Influenced

Identity-Based Revocation from Subset Difference Methods under Simple Assumptions

IACR Cryptology ePrint Archive • 2015
View 18 Excerpts
Highly Influenced

Analysis of Lewko-Sahai-Waters Revocation System

IACR Cryptology ePrint Archive • 2014
View 12 Excerpts
Highly Influenced

185 Citations

02040'10'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 185 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 46 references

Broadcast Encryption

CRYPTO • 1993
View 9 Excerpts
Highly Influenced

Hierarchical Identity Based Encryption with Constant Size Ciphertext

IACR Cryptology ePrint Archive • 2005
View 3 Excerpts
Highly Influenced

A Forward-Secure Public-Key Encryption Scheme

Journal of Cryptology • 2002
View 4 Excerpts
Highly Influenced

Efficient Trace and Revoke Schemes

Financial Cryptography • 2000
View 9 Excerpts
Highly Influenced

Adaptive Security in Broadcast Encryption Systems

IACR Cryptology ePrint Archive • 2008
View 13 Excerpts

Attribute-based encryption with non-monotonic access structures

ACM Conference on Computer and Communications Security • 2007
View 10 Excerpts

Ciphertext-Policy Attribute-Based Encryption

2007 IEEE Symposium on Security and Privacy (SP '07) • 2007
View 2 Excerpts

Similar Papers

Loading similar papers…