Identity-based broadcast encryption with constant size ciphertexts and private keys

被引:0
|
作者
Delerablee, Cecile [1 ]
机构
[1] Orange Labs, Caen, France
来源
关键词
ENCAPSULATION; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the first identity-based broadcast encryption scheme (IBBE) with constant size ciphertexts and private keys. In our scheme, the public key is of size linear in the maximal size m of the set of receivers, which is smaller than the number of possible users (identities) in the system. Compared with a recent broadcast encryption system introduced by Boneh, Gentry and Waters (BGW), our system has comparable properties, but with a better efficiency: the public key is shorter than in BGW. Moreover, the total number of possible users in the system does not have to be fixed in the setup.
引用
收藏
页码:200 / 215
页数:16
相关论文
共 50 条
  • [21] Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 45 - 56
  • [22] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [23] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [24] Adaptively Secure Broadcast Encryption With Constant Ciphertexts
    Guo, Dianli
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    IEEE TRANSACTIONS ON BROADCASTING, 2016, 62 (03) : 709 - 715
  • [25] Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext
    Kim, Jongkil
    Susilo, Willy
    Au, Man Ho
    Seberry, Jennifer
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 679 - 693
  • [26] Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security
    Xu, Peng
    Li, Jingnan
    Wang, Wei
    Jin, Hai
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 223 - 233
  • [27] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [28] Augmented broadcaster identity-based broadcast encryption
    1600, Digital Information Research Foundation, 2 Srinivasamoorthy Avenue, L.B Road, Adyar, Chennai, 600 020, India (11):
  • [29] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    TsinghuaScienceandTechnology, 2018, 23 (05) : 539 - 549
  • [30] Identity-Based Broadcast Encryption for Inner Products
    Lai, Jianchang
    Mu, Yi
    Gu, Fuchun
    Jiang, Peng
    Ma, Sha
    COMPUTER JOURNAL, 2018, 61 (08): : 1240 - 1251