The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Cet article propose une méthode de différence de sous-ensembles ternaire (méthode SD) qui résiste aux attaques de coalition. Afin de réaliser une méthode SD ternaire sécurisée, nous concevons un nouvel algorithme de recherche de couverture, un algorithme d'attribution d'étiquettes et un algorithme de cryptage. Ces algorithmes sont nécessaires pour révoquer simultanément un ou deux sous-arbres tout en maintenant la résistance aux attaques de coalition. Nous réalisons ce mécanisme de révocation bidirectionnel en utilisant de manière créative des étiquettes et des étiquettes hachées. Ensuite, nous évaluons l’efficacité et la sécurité de la méthode ternaire SD. Nous montrons que le nombre d'étiquettes sur chaque appareil client peut être réduit d'environ 20.4 %. Les résultats de la simulation montrent que le schéma proposé réduit la longueur moyenne de l'en-tête jusqu'à 15.0 pour cent dans le cas où le nombre total d'appareils est de 65,536 XNUMX. En revanche, le coût de calcul imposé à un appareil client reste dans les limites O(Journal n). Enfin, nous prouvons que la méthode SD ternaire est sécurisée contre les attaques de coalition.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Kazuhide FUKUSHIMA, Shinsaku KIYOMOTO, Toshiaki TANAKA, Kouichi SAKURAI, "Improved Subset Difference Method with Ternary Tree" in IEICE TRANSACTIONS on Fundamentals,
vol. E93-A, no. 11, pp. 2034-2044, November 2010, doi: 10.1587/transfun.E93.A.2034.
Abstract: This paper proposes a ternary subset difference method (SD method) that is resistant to coalition attacks. In order to realize a secure ternary SD method, we design a new cover-finding algorithm, label assignment algorithm and encryption algorithm. These algorithms are required to revoke one or two subtrees simultaneously while maintaining resistance against coalition attacks. We realize this two-way revocation mechanism by creatively using labels and hashed labels. Then, we evaluate the efficiency and security of the ternary SD method. We show that the number of labels on each client device can be reduced by about 20.4 percent. The simulation results show that the proposed scheme reduces the average header length by up to 15.0 percent in case where the total number of devices is 65,536. On the other hand, the computational cost imposed on a client device stays within O(log n). Finally, we prove that the ternary SD method is secure against coalition attacks.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E93.A.2034/_p
Copier
@ARTICLE{e93-a_11_2034,
author={Kazuhide FUKUSHIMA, Shinsaku KIYOMOTO, Toshiaki TANAKA, Kouichi SAKURAI, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Improved Subset Difference Method with Ternary Tree},
year={2010},
volume={E93-A},
number={11},
pages={2034-2044},
abstract={This paper proposes a ternary subset difference method (SD method) that is resistant to coalition attacks. In order to realize a secure ternary SD method, we design a new cover-finding algorithm, label assignment algorithm and encryption algorithm. These algorithms are required to revoke one or two subtrees simultaneously while maintaining resistance against coalition attacks. We realize this two-way revocation mechanism by creatively using labels and hashed labels. Then, we evaluate the efficiency and security of the ternary SD method. We show that the number of labels on each client device can be reduced by about 20.4 percent. The simulation results show that the proposed scheme reduces the average header length by up to 15.0 percent in case where the total number of devices is 65,536. On the other hand, the computational cost imposed on a client device stays within O(log n). Finally, we prove that the ternary SD method is secure against coalition attacks.},
keywords={},
doi={10.1587/transfun.E93.A.2034},
ISSN={1745-1337},
month={November},}
Copier
TY - JOUR
TI - Improved Subset Difference Method with Ternary Tree
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 2034
EP - 2044
AU - Kazuhide FUKUSHIMA
AU - Shinsaku KIYOMOTO
AU - Toshiaki TANAKA
AU - Kouichi SAKURAI
PY - 2010
DO - 10.1587/transfun.E93.A.2034
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E93-A
IS - 11
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - November 2010
AB - This paper proposes a ternary subset difference method (SD method) that is resistant to coalition attacks. In order to realize a secure ternary SD method, we design a new cover-finding algorithm, label assignment algorithm and encryption algorithm. These algorithms are required to revoke one or two subtrees simultaneously while maintaining resistance against coalition attacks. We realize this two-way revocation mechanism by creatively using labels and hashed labels. Then, we evaluate the efficiency and security of the ternary SD method. We show that the number of labels on each client device can be reduced by about 20.4 percent. The simulation results show that the proposed scheme reduces the average header length by up to 15.0 percent in case where the total number of devices is 65,536. On the other hand, the computational cost imposed on a client device stays within O(log n). Finally, we prove that the ternary SD method is secure against coalition attacks.
ER -