A new ID-based broadcast encryption scheme

被引:0
|
作者
Yang, Chen [1 ]
Cheng, Xiangguo [1 ]
Ma, Wenping [1 ]
Wang, Xinmei [1 ]
机构
[1] Xidian Univ, Minist Educ, Key Lab Comp Networks & Informat Secur, Xian 710071, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a new efficient identity-based broadcast encryption scheme using bilinear mapping. Both private-key storage for one authorized user (only two, group elements) and communication transmission bandwidth (three group elements) in our scheme are of constant size regardless of the number of colluders. In terms of efficiency and security, our scheme is very efficient with lower encryption and decryption computational cost and more secure against k number of colluders by introducing self-enforcing protection strategy.
引用
收藏
页码:487 / 492
页数:6
相关论文
共 50 条
  • [22] Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks
    Benzaid, Chafika
    Medjadba, Sana
    Al-Nemrat, Ameer
    Badache, Nadjib
    [J]. 15TH IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2012) / 10TH IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2012), 2012, : 633 - 639
  • [23] ID-based key agreement for multimedia encryption
    Yi, X
    Tan, CH
    Siew, CK
    Syed, MR
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2002, 48 (02) : 298 - 303
  • [24] Group ID-Based Encryption with Equality Test
    Ling, Yunhao
    Ma, Sha
    Huang, Qiong
    Xiang, Ru
    Li, Ximing
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 39 - 57
  • [25] Fast Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks
    Benzaid, Chafika
    Medjadba, Sana
    Badache, Nadjib
    [J]. 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS): WORKSHOPS, 2012,
  • [26] A Comparison on Broadcast Encryption Schemes: A New Broadcast Encryption Scheme
    Bodur, Huseyin
    Kara, Resul
    [J]. ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2020, 20 (04) : 69 - 80
  • [27] A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
    Ming Yang Wang Yumin (State Key Lab of Integrated Service Network
    [J]. Journal of Electronics(China), 2008, (02) : 226 - 231
  • [28] ID-based digital multisignature scheme
    Tang, SH
    Wei, G
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 1999, 9 (3-4) : 223 - 227
  • [29] Efficient ID-Based Proxy Pre-Encryption Scheme for Data Sharing in Cloud
    Zhang, Jian-Hong
    Zhen, Wei-Na
    Zhao, Xu-Bing
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 378 - 383
  • [30] A new efficient ID-based proxy blind signature scheme
    Lang, WM
    Tan, YM
    Yang, ZK
    Liu, G
    Peng, B
    [J]. ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 407 - 411