Identity-based broadcast encryption scheme using the new techniques for dual system encryption

被引:0
|
作者
Sun J. [1 ,2 ]
Hu Y.-P. [1 ]
机构
[1] Key Lab of Computer Network and Information Security, Xidian University
[2] Department of Application Mathematics, Xi'an University of Technology
关键词
Broadcast encryption; Dual system encryption; Identity based cryptography; Provably secure; Standard model;
D O I
10.3724/SP.J.1146.2010.01017
中图分类号
学科分类号
摘要
According to the broadcast encryption scheme with wide applications in the real world but its security and efficiency can not be taken into consideration in the model simultaneously, a novel identity-based broadcast encryption scheme is proposed by combining with Waters dual system encryption and the orthogonality property of composite-order bilinear groups. Based on the standard model without tags, the scheme can achieve constant-size key and ciphertext. The scheme is proved by using the three static assumptions which do not depend on the number of queries the attacker makes. Furthermore, the analysis results indicated that the scheme of this paper is fully secure and can satisfy the higher efficiency and practice requirement.
引用
收藏
页码:1266 / 1270
页数:4
相关论文
共 13 条
  • [1] Fiat A., Naor M., Broadcast encryption, CRYPTO'93, LNCS 773, pp. 480-491, (1993)
  • [2] Zhang Y.L., Zhang Y.K., Zhang J., An ID-based broadcast encryption scheme for collaborative design, International Conference on Networks Security, Wireless Communications and Trusted Computing, IEEE Computer Society, 346, pp. 699-702, (2009)
  • [3] Delerablee C., Paillier P., Pointcheval D., Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys, LNCS 4575, pp. 39-59, (2007)
  • [4] Sharmila D.S.S., Sree V.S., Ragavendran G., Et al., Cryptanalysis of ID-based signcryption scheme for multiple receivers, (2008)
  • [5] Zhang L.Y., Hu Y.P., Mu N.B., Identity-based broadcast encryption protocol for Ad hoc networks, The 9th International Conference for Young Computer Scientists, IEEE Computer Society, 194, pp. 1619-1623, (2009)
  • [6] Shamir A., Identity-based cryptosyetems and signature schemes, CRYPTO 1984, LNCS 196, pp. 47-53, (1984)
  • [7] Waters B., Efficient identity based encryption without random oracles, LNCS 3494, pp. 114-127, (2005)
  • [8] Baek J., Safavi-Naini R., Susilo W., Efficient multi-receiver identity-based encryption and its application to broadcast encryption, LNCS 3386, pp. 380-397, (2005)
  • [9] Barbosa M., Farshim P., Efficient identity-based key encapsulation to multiple parties, Cryptography and Coding, 10th IMA International Conference Cirencester, LNCS 3796, pp. 428-441, (2005)
  • [10] Waters B., Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions, Advances in Cryptology-CRYPTO, LNCS 5677, pp. 619-636, (2009)