Identity-based Broadcast Group-oriented Encryption from Pairings

被引:0
|
作者
Zhang, Bo [1 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Shandong, Peoples R China
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we formalize the notion of identity-based broadcast group-oriented encryption scheme and present a construction for it based on Gentry's IBE scheme. In our new scheme, the broadcaster could encrypt the message using the designated receive group's identity and any receiver in the designated group can independently decrypt the ciphertext. The newly proposed scheme has the following merits: Every member of the receiving group needs to keep only one private key; Both ciphertexts and system parameters are of constant size; A sender can send a secure message just by using the receive group's identity information, even before the receiver in the designated group obtains his private key from a PKG.
引用
收藏
页码:405 / 408
页数:4
相关论文
共 50 条
  • [41] A MULTIVARIATE IDENTITY-BASED BROADCAST ENCRYPTION WITH APPLICATIONS TO THE INTERNET OF THINGS
    Srivastava, Vikas
    Debnath, Sumit Kumar
    Stanica, Pantelimon
    Pal, Saibal Kumar
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2023, 17 (06) : 1302 - 1313
  • [42] New identity-based society oriented signature schemes from pairings on elliptic curves
    Lin, CY
    Wu, TC
    Zhang, FG
    Hwang, JJ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 160 (01) : 245 - 260
  • [43] Identity based group-oriented undeniable signature scheme
    Guo, XY
    Tang, CJ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1448 - 1457
  • [44] Efficient multi-receiver identity-based encryption and its application to broadcast encryption
    Baek, J
    Safavi-Naini, R
    Susilo, W
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 380 - 397
  • [45] Identity-based broadcast encryption scheme using the new techniques for dual system encryption
    Sun J.
    Hu Y.-P.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2011, 33 (05): : 1266 - 1270
  • [46] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71
  • [47] Identity-based deniable authentication protocol from pairings
    Liao, I-En
    Lee, Cheng-Chi
    Shiang, Wufeng
    Hwang, Min-Shiang
    PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2006, : 112 - +
  • [48] Identity-based key agreement protocols from pairings
    Chen, L.
    Cheng, Z.
    Smart, N. P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) : 213 - 241
  • [49] An Identity-Based Proxy Signature from Bilinear Pairings
    Ji, Huifang
    Han, Wenbao
    Zhao, Long
    Wang, Yongjuan
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17
  • [50] Identity-based broadcast encryption with constant size ciphertexts and private keys
    Delerablee, Cecile
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 200 - 215