Cryptography Reference
In-Depth Information
Recall that the Theorem 2.36 relates the transmission overhead of a set
system with the upper bound on the lower maximal partition order for the
intersection of an ideal with a complement of an atomic filter. Hence, we obtain
the transmission overhead for the ciphertext revoking r users is bounded by
r(2k+t(d)−1)+1. That would conclude the case when k is a constant. While
on the other hand, if d is a constant then we obtain r(log log n).
Regarding the key storage and the computation overhead, we successively
apply the bounds given in theorem 2.55 to obtain for i = 1,...,k:
s i = 2s i−1 + 2 i−1 log d
where s 0 = s(d). By applying a telescopic sum over i values we will obtain
s k = 2 k s(d) + k2 k−1 log d = 2 k s(d) + k log 2 . That would conclude the case
when k is a constant. In case d is constant we have k = log log n, hence the
key storage is O(log log n· log n).
4
Fig. 2.20. The X-transformation over the set system Φ 4 = AS Φ {1,2} .
We will next give an example of an AS set system and an application
of the transformation technique above. We first start with a set system
Φ {1,2} = {{1,2},{1},{2}} that is the power set (without the empty set) of
the set {1,2}. Observe that this basic set system satisfies the X− property
and it is factorizable set system. Hence, the transformation described in de-
finition 2.52 will yield factorizable set systems over exponentially growing
receiver populations that satisfy the statement of the corollary 2.57 . Observe
that the resulting set system AS Φ {1,2} is defined over a receiver population of
size 16. The figure 2.20 illustrates the resulting set system after applying the
transformation twice on the above simple set system.
 
 
Search WWH ::




Custom Search