Identity-based Broadcast Group-oriented Encryption from Pairings

被引:0
|
作者
Zhang, Bo [1 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Shandong, Peoples R China
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we formalize the notion of identity-based broadcast group-oriented encryption scheme and present a construction for it based on Gentry's IBE scheme. In our new scheme, the broadcaster could encrypt the message using the designated receive group's identity and any receiver in the designated group can independently decrypt the ciphertext. The newly proposed scheme has the following merits: Every member of the receiving group needs to keep only one private key; Both ciphertexts and system parameters are of constant size; A sender can send a secure message just by using the receive group's identity information, even before the receiver in the designated group obtains his private key from a PKG.
引用
收藏
页码:405 / 408
页数:4
相关论文
共 50 条
  • [1] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [2] Broadcast group-oriented encryption in group communication
    Ma, Chunbo
    Wu, Yue
    Li, Jianhua
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1623 - +
  • [3] A Novel Biometric Signcryption Scheme that Is Identity-based and Group-oriented
    Wang, Mingwen
    Tang, Dongming
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 849 - 854
  • [4] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [5] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [6] Shorter identity-based encryption via asymmetric pairings
    Jie Chen
    Hoon Wei Lim
    San Ling
    Huaxiong Wang
    Hoeteck Wee
    [J]. Designs, Codes and Cryptography, 2014, 73 : 911 - 947
  • [7] Shorter identity-based encryption via asymmetric pairings
    Chen, Jie
    Lim, Hoon Wei
    Ling, San
    Wang, Huaxiong
    Wee, Hoeteck
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (03) : 911 - 947
  • [8] Augmented broadcaster identity-based broadcast encryption
    [J]. 1600, Digital Information Research Foundation, 2 Srinivasamoorthy Avenue, L.B Road, Adyar, Chennai, 600 020, India (11):
  • [9] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [10] Identity-Based Broadcast Encryption for Inner Products
    Lai, Jianchang
    Mu, Yi
    Gu, Fuchun
    Jiang, Peng
    Ma, Sha
    [J]. COMPUTER JOURNAL, 2018, 61 (08): : 1240 - 1251