Identity-based Broadcast Group-oriented Encryption from Pairings

被引:0
|
作者
Zhang, Bo [1 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Shandong, Peoples R China
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we formalize the notion of identity-based broadcast group-oriented encryption scheme and present a construction for it based on Gentry's IBE scheme. In our new scheme, the broadcaster could encrypt the message using the designated receive group's identity and any receiver in the designated group can independently decrypt the ciphertext. The newly proposed scheme has the following merits: Every member of the receiving group needs to keep only one private key; Both ciphertexts and system parameters are of constant size; A sender can send a secure message just by using the receive group's identity information, even before the receiver in the designated group obtains his private key from a PKG.
引用
收藏
页码:405 / 408
页数:4
相关论文
共 50 条
  • [31] Identity-based key agreement for peer group communication from pairings
    Wu, ST
    Chiu, JH
    Chieu, BC
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (10) : 2762 - 2768
  • [32] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [33] Identity-based secure group communications using pairings
    Rossi, Francesco
    Schmid, Giovanni
    COMPUTER NETWORKS, 2015, 89 : 32 - 43
  • [34] Improved Group-oriented Encryption for Group Communication
    Ma, Chunbo
    Ao, Jun
    INTERNATIONAL JOINT CONFERENCE ON COMPUTATIONAL SCIENCES AND OPTIMIZATION, VOL 2, PROCEEDINGS, 2009, : 667 - 671
  • [35] Identity-based proxy signature from pairings
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Seberry, Jennifer
    Huang, Xinyi
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
  • [36] ID-based group-oriented proxy signature and blind signature from pairings
    Chen, XF
    Zhang, FG
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (01): : 12 - 16
  • [37] Analysis of broadcast schemes that implement identity-based encryption algorithms
    Kulakov A.N.
    Aleksandrova E.B.
    Autom. Control Comput. Sci., 8 (790-797): : 790 - 797
  • [38] Cryptanalysis of RNZ, an identity-based fully anonymous broadcast encryption
    Mandal, Mriganka
    ICT EXPRESS, 2020, 6 (04): : 316 - 319
  • [39] Efficient Identity-based Broadcast Encryption without Random Oracles
    Hu, Liang
    Liu, Zheli
    Cheng, Xiaochun
    JOURNAL OF COMPUTERS, 2010, 5 (03) : 331 - 336
  • [40] An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks
    Zhang, Leyou
    Hu, Yupu
    Mu, Ningbo
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1619 - +