A broadcast exclusion protocol allows a broadcaster to transmit a encrypted message to a set of n users over a broadcast channel so that all but some specified small group of k excluded users can decrypt the message, even if these excluded users collude with each other in an arbitrary manner. Recently, Matsuzaki et al. pointed out a potential problem in the earlier works regarding the number of modular exponentiation, and proposed an extended scheme in which decryption requires only two modular exponentiations regardless of n and k. However, our analysis shows this scheme has a limitation of the number of rounds. The contribution of this paper is to present a new broadcast exclusion protocol maintaining security within a virtually unlimited number of rounds without spoiling the efficiency. First, we demonstrate a limitation of the rounds of the previous work by showing how a user can derive the system secret parameters after more than a certain number of rounds. Then, we present a new protocol for which we can provide rigorous security proof under the Computational Diffie-Hellman (CDH) assumption. We note that even if we point out some limitation of the previous work, we still consider it nevertheless significant. In particular, we derived our new protocol by modifying some of their fundamental techniques.
[1]
E. Berlekamp.
Factoring polynomials over large finite fields*
,
1970,
SYMSAC '71.
[2]
Amit Sahai,et al.
Coding Constructions for Blacklisting Problems without Computational Assumptions
,
1999,
CRYPTO.
[3]
Tomoyuki Asano.
A Revocation Scheme with Minimal Storage at Receivers
,
2002,
ASIACRYPT.
[4]
Tsutomu Matsumoto,et al.
A Quick Group Key Distribution Scheme with "Entity Revocation"
,
1999,
ASIACRYPT.
[5]
Moni Naor,et al.
Revocation and Tracing Schemes for Stateless Receivers
,
2001,
CRYPTO.
[6]
Kaoru Kurosawa,et al.
Linear Code Implies Public-Key Traitor Tracing
,
2002,
Public Key Cryptography.
[7]
Yvo Desmedt,et al.
Optimum Traitor Tracing and Asymmetric Schemes
,
1998,
EUROCRYPT.
[8]
Amos Fiat,et al.
Broadcast Encryption
,
1993,
CRYPTO.
[9]
Adi Shamir,et al.
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations
,
2000,
EUROCRYPT.
[10]
Tsutomu Matsumoto,et al.
Light Weight Broadcast Exclusion Using Secret Sharing
,
2000,
ACISP.
[11]
Yvo Desmedt,et al.
Threshold Cryptosystems
,
1989,
CRYPTO.