An Efficient Anonymous Identity-Based Broadcast Encryption for Large-Scale Wireless Sensor Networks

被引:0
|
作者
Kim, In Tae [1 ]
Hwang, Seong Oun [2 ]
Kim, Seungwoon
机构
[1] Hongik Univ, Dept Elect & Comp Engn, Seoul, South Korea
[2] Hongik Univ, Dept Comp & Informat Commun Engn, Seoul, South Korea
关键词
cryptography; identity-based encryption; identity-based broadcast encryption; sensor network; CONSTANT-SIZE CIPHERTEXTS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Previous identity-based broadcast encryption schemes have mainly focused on reducing the ciphertext and key size. These efforts have resulted in computation and/or storage overhead on a user's side. Therefore, they are not suitable for wireless sensor networks which are very limited in computation capability, storage, and energy resources. In this paper, we propose an efficient, scalable identity-based broadcast encryption scheme suitable for sensor networks by significantly reducing both computation and storage overhead: all of the public key, private keys, and ciphertexts are of constant size. Furthermore, the proposed scheme is also efficient in communication overhead by removing the set of receivers from ciphertexts. This also enables the proposed scheme to protect the privacy of receivers' identities.
引用
收藏
页码:27 / 39
页数:13
相关论文
共 50 条
  • [41] Identity-based Broadcast Encryption with Shorter Transmissions
    张乐友
    胡予濮
    牟宁波
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, 13 (06) : 641 - 645
  • [42] Identity-Based Broadcast Encryption with Recipient Privacy
    Zhang, Weimin
    Xu, Qiuliang
    He, Peng
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 483 - 487
  • [43] Identity-based broadcast encryption with shorter transmissions
    Zhang L.-Y.
    Hu Y.-P.
    Mu N.-B.
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 (6) : 641 - 645
  • [44] Broadcast encryption using identity-based cryptosystem
    Lv, Xixiang
    Yang, Bo
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (04) : 716 - 720
  • [45] Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks
    Chien, Hung-Yu
    Lee, Chin-I
    Wu, Tzong-Chen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 993 - 998
  • [46] Identity-based authenticated broadcast encryption and distributed authenticated encryption
    Mu, Y
    Susilo, W
    Lin, YX
    Ruan, C
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 169 - 181
  • [47] Practical Identity-Based Signature for Wireless Sensor Networks
    Li, Fagen
    Zhong, Di
    Takagi, Tsuyoshi
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2012, 1 (06) : 637 - 640
  • [48] Anonymous Lattice Identity-Based Encryption with Traceable Identities
    Boyen, Xavier
    Foo, Ernest
    Li, Qinyi
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 630 - 649
  • [49] An Anonymous Multireceiver with Online/Offline Identity-Based Encryption
    Wang, Qihua
    Li, Fagen
    Wang, Huaqun
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [50] Anonymous Identity-Based Encryption with Bounded Leakage Resilience
    Liu, Pengtao
    Hu, Chengyu
    Guo, Shanqing
    Wang, Yilei
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 287 - 292