Identity-based broadcast encryption with constant size ciphertexts and private keys

被引:0
|
作者
Delerablee, Cecile [1 ]
机构
[1] Orange Labs, Caen, France
来源
关键词
ENCAPSULATION; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the first identity-based broadcast encryption scheme (IBBE) with constant size ciphertexts and private keys. In our scheme, the public key is of size linear in the maximal size m of the set of receivers, which is smaller than the number of possible users (identities) in the system. Compared with a recent broadcast encryption system introduced by Boneh, Gentry and Waters (BGW), our system has comparable properties, but with a better efficiency: the public key is shorter than in BGW. Moreover, the total number of possible users in the system does not have to be fixed in the setup.
引用
收藏
页码:200 / 215
页数:16
相关论文
共 50 条
  • [41] Identity-based broadcast encryption with continuous leakage resilience
    Li, Jiguo
    Yu, Qihong
    Zhang, Yichen
    INFORMATION SCIENCES, 2018, 429 : 177 - 193
  • [42] Identity-Based Broadcast Encryption Schemes For Open Networks
    Li, Mingchu
    Xu, Xiaodong
    Zhuang, Ruhan
    Guo, Cheng
    Tan, Xing
    2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 104 - 109
  • [43] Identity-based Threshold Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (03): : 400 - 410
  • [44] Privacy-preserving identity-based broadcast encryption
    Hur, Junbeom
    Park, Chanil
    Hwang, Seong Oun
    INFORMATION FUSION, 2012, 13 (04) : 296 - 303
  • [45] Identity-based Broadcast Encryption Scheme with Untrusted PKG
    Guo, Shanqing
    Zhang, Chunhua
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1613 - 1618
  • [46] Fully Secure Identity-based Broadcast Encryption in the Subgroups
    Zhang Leyou
    Hu Yupu
    Wu Qing
    CHINA COMMUNICATIONS, 2011, 8 (02) : 152 - 158
  • [47] Constant Size Ciphertexts in Threshold Attribute-Based Encryption
    Herranz, Javier
    Laguillaumie, Fabien
    Rafols, Carla
    PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 19 - +
  • [48] Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
    Liang, Kaitai
    Chu, Cheng-Kang
    Tan, Xiao
    Wong, Duncan S.
    Tang, Chunming
    Zhou, Jianying
    THEORETICAL COMPUTER SCIENCE, 2014, 539 : 87 - 105
  • [49] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [50] Revocable Broadcast Encryption with Constant Ciphertext and Private Key Size
    JIA Hongyong
    CHEN Yue
    YANG Kuiwu
    GUO Yuanbo
    WANG Zhiwei
    ChineseJournalofElectronics, 2019, 28 (04) : 690 - 697