Efficient ID-based broadcast encryption scheme - Comments

被引:14
|
作者
Chien, Hung-Yu [1 ]
机构
[1] Natl Chi Nan Univ, Dept Informat Management, Nantou 545, Taiwan
关键词
broadcasting; computer network security; cryptography; privacy; public key cryptography; security;
D O I
10.1109/TBC.2007.908331
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Based on bilinear pairing, Du et al recently proposed an efficient ID-based broadcast encryption scheme. This correspondence shows that the scheme is not secure in the sense that an adversary can easily derive the secret when there are only two designated receivers. By the way, we comment that the scheme gains the efficiency of the sender at the price of sacrificing the efficiency of the receivers.
引用
收藏
页码:809 / 810
页数:2
相关论文
共 50 条
  • [1] A new ID-based broadcast encryption scheme
    Yang, Chen
    Cheng, Xiangguo
    Ma, Wenping
    Wang, Xinmei
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 487 - 492
  • [2] An ID-based broadcast encryption scheme for key distribution
    Du, XJ
    Wang, Y
    Ge, JH
    Wang, YM
    [J]. IEEE TRANSACTIONS ON BROADCASTING, 2005, 51 (02) : 264 - 266
  • [3] An ID-based Broadcast Encryption Scheme for Collaborative Design
    Zhang, Ya-ling
    Zhang, Jing
    Zhang, Yi-kun
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 699 - 702
  • [4] ID-based Encryption Scheme with Revocation
    Othman, Hafizul Azrie
    Ismail, Eddie Shahril
    [J]. 4TH INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES (ICMS4): MATHEMATICAL SCIENCES: CHAMPIONING THE WAY IN A PROBLEM BASED AND DATA DRIVEN SOCIETY, 2017, 1830
  • [5] Comment on an ID-based Broadcast Signcryption Scheme
    Zhang, Jianhong
    Geng, Qin
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 37 - 40
  • [6] An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid
    Niu, Shufen
    Fang, Lizhi
    Song, Mi
    Yu, Fei
    Han, Song
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (09): : 3365 - 3383
  • [7] An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT
    Fan, Chun-I
    Shie, Cheng-Han
    Tseng, Yi-Fan
    Huang, Hui-Chun
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2023, 19 (03)
  • [8] Efficient hybrid encryption from ID-based encryption
    Masayuki Abe
    Yang Cui
    Hideki Imai
    Eike Kiltz
    [J]. Designs, Codes and Cryptography, 2010, 54 : 205 - 240
  • [9] Efficient hybrid encryption from ID-based encryption
    Abe, Masayuki
    Cui, Yang
    Imai, Hideki
    Kiltz, Eike
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2010, 54 (03) : 205 - 240
  • [10] A proposal of efficient scheme of key management using ID-based encryption and biometrics
    Izumi, Akitoshi
    Ueshige, Yoshifumi
    Sakurai, Kouichi
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 29 - +