Identity-based broadcast encryption with constant size ciphertexts and private keys

被引:0
|
作者
Delerablee, Cecile [1 ]
机构
[1] Orange Labs, Caen, France
来源
关键词
ENCAPSULATION; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the first identity-based broadcast encryption scheme (IBBE) with constant size ciphertexts and private keys. In our scheme, the public key is of size linear in the maximal size m of the set of receivers, which is smaller than the number of possible users (identities) in the system. Compared with a recent broadcast encryption system introduced by Boneh, Gentry and Waters (BGW), our system has comparable properties, but with a better efficiency: the public key is shorter than in BGW. Moreover, the total number of possible users in the system does not have to be fixed in the setup.
引用
收藏
页码:200 / 215
页数:16
相关论文
共 50 条
  • [31] Identity-based Broadcast Encryption with Shorter Transmissions
    张乐友
    胡予濮
    牟宁波
    JournalofShanghaiJiaotongUniversity(Science), 2008, 13 (06) : 641 - 645
  • [32] Identity-based broadcast encryption with shorter transmissions
    Zhang L.-Y.
    Hu Y.-P.
    Mu N.-B.
    J. Shanghai Jiaotong Univ. Sci., 2008, 6 (641-645): : 641 - 645
  • [33] Identity-Based Broadcast Encryption with Recipient Privacy
    Zhang, Weimin
    Xu, Qiuliang
    He, Peng
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 483 - 487
  • [34] Broadcast encryption using identity-based cryptosystem
    Lv, Xixiang
    Yang, Bo
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (04): : 716 - 720
  • [35] Attribute-based encryption with constant size ciphertexts
    Chen, Shao-Zhen
    Wang, Hai-Bin
    Tongxin Xuebao/Journal on Communications, 2011, 32 (11 A): : 190 - 195
  • [36] Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
    Gay, Romain
    Kowalczyk, Lucas
    Wee, Hoeteck
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 123 - 139
  • [37] Identity-based authenticated broadcast encryption and distributed authenticated encryption
    Mu, Y
    Susilo, W
    Lin, YX
    Ruan, C
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 169 - 181
  • [38] Continual auxiliary leakage-resilient attribute-based broadcast encryption with constant size ciphertexts
    Yujie S.
    Leyou Z.
    Xiaoxu G.
    Journal of China Universities of Posts and Telecommunications, 2020, 27 (04): : 69 - 82
  • [39] Continual auxiliary leakage-resilient attribute-based broadcast encryption with constant size ciphertexts
    Shang Yujie
    Zhang Leyou
    Gao Xiaoxu
    The Journal of China Universities of Posts and Telecommunications, 2020, 27 (04) : 69 - 82
  • [40] Novel identity-based broadcast encryption in the standard model
    Zhang, Leyou
    Xu, Zhiqin
    ICIC Express Letters, Part B: Applications, 2013, 4 (03): : 663 - 669