Identity-based broadcast encryption with constant size ciphertexts and private keys

被引:0
|
作者
Delerablee, Cecile [1 ]
机构
[1] Orange Labs, Caen, France
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the first identity-based broadcast encryption scheme (IBBE) with constant size ciphertexts and private keys. In our scheme, the public key is of size linear in the maximal size m of the set of receivers, which is smaller than the number of possible users (identities) in the system. Compared with a recent broadcast encryption system introduced by Boneh, Gentry and Waters (BGW), our system has comparable properties, but with a better efficiency: the public key is shorter than in BGW. Moreover, the total number of possible users in the system does not have to be fixed in the setup.
引用
收藏
页码:200 / 215
页数:16
相关论文
共 50 条
  • [1] Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts
    Zhao, Zhen
    Guo, Fuchun
    Lai, Jianchang
    Susilo, Willy
    Wang, Baocang
    Hu, Yupu
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 809 : 73 - 87
  • [2] Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 12 - 18
  • [3] New identity-based broadcast encryption with constant ciphertexts in the standard model
    Wu, Qing
    Wang, Wenqing
    [J]. Journal of Software, 2011, 6 (10) : 1929 - 1936
  • [4] Hierarchical Identity-Based Encryption with Constant-Size Private Keys
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    [J]. ETRI JOURNAL, 2012, 34 (01) : 142 - 145
  • [5] Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 215 - +
  • [6] Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys
    Zhang, Leyou
    Mu, Yi
    Wu, Qing
    [J]. COMPUTER JOURNAL, 2016, 59 (04): : 452 - 461
  • [7] New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
    Luo, Song
    Chen, Yu
    Hu, Jianbin
    Chen, Zhong
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 55 - 70
  • [8] Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
    Phan, Duong-Hieu
    Pointcheval, David
    Shahandashti, Siamak F.
    Strefler, Mario
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (04) : 251 - 265
  • [9] Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
    Duong-Hieu Phan
    David Pointcheval
    Siamak F. Shahandashti
    Mario Strefler
    [J]. International Journal of Information Security, 2013, 12 : 251 - 265
  • [10] Collusion resistant broadcast encryption with short ciphertexts and private keys
    Boneh, D
    Gentry, C
    Waters, B
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 258 - 275