Multi-receiver certificate-based encryption and application to public key broadcast encryption

被引:13
|
作者
Sur, Chul [1 ]
Jung, Chae Duk [1 ]
Rhee, Kyung Hyune [1 ]
机构
[1] Pukyong Natl Univ, 599-1 Daeyon3 Dong, Pusan 608737, South Korea
关键词
multi-receiver encryption; certificate based encryption; key escrow free; pubic key broadcast encryption; bilinear pairing;
D O I
10.1109/BLISS.2007.23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we firstly introduce the notion of multi-receiver certificate-based encryption that, avoids the inherent key escrow problem while preserving the implicit certification of multi-receiver identity-based encryption. We also construct a highly efficient multi-receiver certificate-based encryption scheme which eliminates pairing computation to encrypt a message for multiple receivers. Moreover the proposed scheme only needs one pairing computation for decrypting the ciphertext. We compare our scheme with the most efficient multi-receiver identity-based encryption scheme[2] in terms of the computational point of view, and show that our scheme provides better efficiency than [2]. Finally, we discuss how to properly transform our scheme into a new public key broadcast encryption scheme based on subset-cover framework, which enjoys the advantages of certificate-based encryption.
引用
收藏
页码:35 / +
页数:2
相关论文
共 50 条
  • [31] Improved Anonymous Multi-receiver Identity-Based Encryption
    Chien, Hung-Yu
    COMPUTER JOURNAL, 2012, 55 (04): : 439 - 446
  • [32] Efficient Revocable Multi-Receiver ID-Based Encryption
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 159 - 169
  • [33] CONSTRUCTING PAIRING-FREE CERTIFICATE-BASED ENCRYPTION
    Lu, Yang
    Li, Jiguo
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (11): : 4509 - 4518
  • [34] Hierarchical Certificate-Based Encryption: Definition and an Efficient Construction
    Xu, Hailin
    Lu, Yang
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1971 - 1974
  • [35] Continuous leakage-resilient certificate-based encryption
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    INFORMATION SCIENCES, 2016, 355 : 1 - 14
  • [36] Threshold Certificate-based Encryption: Definition and Concrete Construction
    Lu, Yang
    Li, Jiguo
    Xiao, Junmo
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 278 - +
  • [37] Certificate-Based Conditional Proxy Re-Encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 299 - 310
  • [38] Provably secure certificate-based encryption with leakage resilience
    Guo, Yuyan
    Li, Jiguo
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    THEORETICAL COMPUTER SCIENCE, 2018, 711 : 1 - 10
  • [39] Generic Construction of Certificate-based Encryption in the Standard Model
    Lu, Yang
    Li, Jiguo
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 25 - 29
  • [40] An Efficient and Provably Secure Certificate-Based Encryption Scheme
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 54 - 61