3.1 3.2 3.3 3.4 3.4.1Complete Subtree Method(CS ) 3.4.1RSA-CS 3.5 4.1 4.2 4.3 4.4 4.5 2
[1] 3
1 4
log n Layer Number : LN 0,1,2 Relative Node Number : RNN 0,1,2 Node Revocation Pattern : NRP 5
LN0 K0000 K0001 K0010 K0011 K0100 K0101 K0110 K0111 K1000 K1001 K1010 K1011 K1100 K1101 K1110 RNN0 1 3K0001 K 0010 K 0011 K 0100 K 0101 K 0110 1 3K0111 1 3K1000 K 1001 K 1010 K 1011 K 1100 K 1101 1 3K1110 LN RNN K NRP LN RNN3 3.1 6
LN0 LN K0000 K0001 K0010 K0011 K0100 K0101 K0110 K0111 K1000 K1001 K1010 K1011 K1100 K1101 K1110 K0001 K0010 K0011 K0100 K0101 K0110 K0111 K1000 K1001 K1010 K1011 K1100 K1101 K1110 LN K K XXX 0 XXX 0 X 0 1 3. K1000 1 0 K1100 7
LN0 K 1000 LN1 1 0 K 1100 LN2 3.3 Complete Subtree MethodCS Complete Subtree MethodCS RSA d e, n RSA CS 8
9
Web KeyM.class Encoder.class Rev.class EDcenter.class 10
Encoder.class EDcenter.class Step1-1 KeyM.class Step1-2 Step1-3 Rev.class Step1-4 Step2-1 Step2-2 11
Step3-1 Step3-2 12
Web 13
Web 14
Web Web 15
16
CLOAK AKAFUN RANGER NEWSCAST 17
Fortune 18
2002 D.Naor, M.Naor, and J.Lotspiech Revocation and Tracing Schemes for StatelessReceivers, CRYPTO 2001,pp.2001 19
20