Identity-based Broadcast Group-oriented Encryption from Pairings

被引:0
|
作者
Zhang, Bo [1 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Shandong, Peoples R China
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we formalize the notion of identity-based broadcast group-oriented encryption scheme and present a construction for it based on Gentry's IBE scheme. In our new scheme, the broadcaster could encrypt the message using the designated receive group's identity and any receiver in the designated group can independently decrypt the ciphertext. The newly proposed scheme has the following merits: Every member of the receiving group needs to keep only one private key; Both ciphertexts and system parameters are of constant size; A sender can send a secure message just by using the receive group's identity information, even before the receiver in the designated group obtains his private key from a PKG.
引用
收藏
页码:405 / 408
页数:4
相关论文
共 50 条
  • [21] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    Zhu Yan
    Wang Shanbiao
    Ma Di
    Feng Rongquan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 842 - 850
  • [22] Identity Based Group Signatures from Hierarchical Identity-Based Encryption
    Smart, Nigel P.
    Warinschi, Bogdan
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 150 - 170
  • [23] Novel identity-based broadcast encryption in the standard model
    Zhang, Leyou
    Xu, Zhiqin
    [J]. ICIC Express Letters, Part B: Applications, 2013, 4 (03): : 663 - 669
  • [24] Identity-Based Broadcast Encryption Schemes For Open Networks
    Li, Mingchu
    Xu, Xiaodong
    Zhuang, Ruhan
    Guo, Cheng
    Tan, Xing
    [J]. 2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 104 - 109
  • [25] Identity-based broadcast encryption with continuous leakage resilience
    Li, Jiguo
    Yu, Qihong
    Zhang, Yichen
    [J]. INFORMATION SCIENCES, 2018, 429 : 177 - 193
  • [26] Identity-based Threshold Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (03): : 400 - 410
  • [27] Identity-based Broadcast Encryption Scheme with Untrusted PKG
    Guo, Shanqing
    Zhang, Chunhua
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1613 - 1618
  • [28] Privacy-preserving identity-based broadcast encryption
    Hur, Junbeom
    Park, Chanil
    Hwang, Seong Oun
    [J]. INFORMATION FUSION, 2012, 13 (04) : 296 - 303
  • [29] Fully Secure Identity-based Broadcast Encryption in the Subgroups
    Zhang Leyou
    Hu Yupu
    Wu Qing
    [J]. CHINA COMMUNICATIONS, 2011, 8 (02) : 152 - 158
  • [30] Identity-Based Group Encryption Revisited
    Gupta, Kanika
    Selvi, S. Sharmila Deva
    Rangan, C. Pandu
    Dighe, Shubham Sopan
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 205 - 209