Identity Based Broadcast Encryption Based on One to Many Identity Based Proxy Re-encryption

被引:7
作者
Wang, Xu An
Yang, Xiaoyuan
机构
来源
2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1 | 2009年
关键词
D O I
10.1109/ICCSIT.2009.5234998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption schemes enable senders to efficiently broadcast ciphertexts to a large set of receivers in a way that only non-revoked receivers can decrypt them. Identity based broadcast encryption schemes are public key broadcast encryption using identity as the public key. In this paper, we show a novel way to construct identity based broadcast encryption. We introduce a new concept: one to many identity based proxy re-encryption. And we show how to construct efficient identity based broadcast encryption based on this primitive. Our scheme can achieve constant size public keys and private keys and linear size ciphertext. But our scheme no longer needs explicitly describing receiver set while all the other schemes need. Thus our scheme is an efficient broadcast encryption scheme compared with other schemes.
引用
收藏
页码:47 / 50
页数:4
相关论文
共 17 条
[1]  
[Anonymous], IDENTITY BASED PROXY
[2]  
[Anonymous], PROPOSAL P1363 3 PRO
[3]  
[Anonymous], THESIS MIT
[4]  
[Anonymous], PROPOSAL P1363 3 PRO
[5]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[6]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[7]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[8]  
Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
[9]  
Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189
[10]  
Fiat A., 1994, ADV CRYPTOLOGY CRYPT, V13, P480, DOI DOI 10.1007/3-540-48329-2