A METHOD FOR ATTRIBUTE BASED BROADCAST ENCRYPTION WITH PERMANENT REVOCATION
First Claim
1. A method for broadcast encryption that allows a broadcaster to send encrypted data to a set of users such that only a subset of authorized users can decrypt said data, wherein said method supports permanent revocation of users;
- said method comprising the following modifications to the four stages of the basic Cipher-text Policy Attribute-Based Encryption techniques;
a) in the setup stage—
a random control component is added by said broadcaster to the master key;
b) in the key generation stage—
said broadcaster sends to each user a private key that includes the attributes of said user and a component that includes the state of said user, wherein said state of said user is a function of said random control component;
c) in the encrypt stage;
said broadcaster constructs a ciphertext by use of an algorithm that includes a global secret key, wherein said global secret key is encrypted by said private keys of said subset of authorized users; and
d) in the decrypt stage;
the broadcaster sends said ciphertext which encrypts said global secret key to said authorized users, whereupon only users in said subset of authorized users are able to decrypt and use said global secret key.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention is a method for broadcast encryption that allows a broadcaster to send encrypted data to a set of users such that only a subset of authorized users can decrypt said data. The method comprises modifications to the four stages of the basic Cipher-text Policy Attribute-Based Encryption techniques. The method can be adapted to transform any Attribute-Based Encryption scheme that supports only temporary revocation into a scheme that supports the permanent revocation of users.
-
Citations
3 Claims
-
1. A method for broadcast encryption that allows a broadcaster to send encrypted data to a set of users such that only a subset of authorized users can decrypt said data, wherein said method supports permanent revocation of users;
-
said method comprising the following modifications to the four stages of the basic Cipher-text Policy Attribute-Based Encryption techniques; a) in the setup stage—
a random control component is added by said broadcaster to the master key;b) in the key generation stage—
said broadcaster sends to each user a private key that includes the attributes of said user and a component that includes the state of said user, wherein said state of said user is a function of said random control component;c) in the encrypt stage;
said broadcaster constructs a ciphertext by use of an algorithm that includes a global secret key, wherein said global secret key is encrypted by said private keys of said subset of authorized users; andd) in the decrypt stage;
the broadcaster sends said ciphertext which encrypts said global secret key to said authorized users, whereupon only users in said subset of authorized users are able to decrypt and use said global secret key. - View Dependent Claims (2, 3)
-
Specification