File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TIFS.2014.2388156
- Scopus: eid_2-s2.0-84923249651
- WOS: WOS:000350151500002
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext
Title | Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext |
---|---|
Authors | |
Keywords | cryptography broadcast encryption identity-based broadcast encryption public key |
Issue Date | 2015 |
Citation | IEEE Transactions on Information Forensics and Security, 2015, v. 10, n. 3, p. 679-693 How to Cite? |
Abstract | © 2005-2012 IEEE. In this paper, we present an adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext in the standard model. The size of the public key and the private keys of our system are both linear in the maximum number of receivers. In addition, our system is fully collusion-resistant and has stateless receivers. Compared with the state-of-the-art, our scheme is well optimized for the broadcast encryption. The computational complexity of decryption of our scheme depends only on the number of receivers, not the maximum number of receivers of the system. Technically, we employ dual system encryption technique and our proposal offers adaptive security under the general subgroup decisional assumption. Our scheme demonstrates that the adaptive security of the schemes utilizing a composite order group can be proven under the general subgroup decisional assumption, while many existing systems working in a composite order group are secure under multiple subgroup decision assumptions. We note that this finding is of an independent interest, which may be useful in other scenarios. |
Persistent Identifier | http://hdl.handle.net/10722/280819 |
ISSN | 2023 Impact Factor: 6.3 2023 SCImago Journal Rankings: 2.890 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Jongkil | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Seberry, Jennifer | - |
dc.date.accessioned | 2020-02-17T14:35:01Z | - |
dc.date.available | 2020-02-17T14:35:01Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | IEEE Transactions on Information Forensics and Security, 2015, v. 10, n. 3, p. 679-693 | - |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280819 | - |
dc.description.abstract | © 2005-2012 IEEE. In this paper, we present an adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext in the standard model. The size of the public key and the private keys of our system are both linear in the maximum number of receivers. In addition, our system is fully collusion-resistant and has stateless receivers. Compared with the state-of-the-art, our scheme is well optimized for the broadcast encryption. The computational complexity of decryption of our scheme depends only on the number of receivers, not the maximum number of receivers of the system. Technically, we employ dual system encryption technique and our proposal offers adaptive security under the general subgroup decisional assumption. Our scheme demonstrates that the adaptive security of the schemes utilizing a composite order group can be proven under the general subgroup decisional assumption, while many existing systems working in a composite order group are secure under multiple subgroup decision assumptions. We note that this finding is of an independent interest, which may be useful in other scenarios. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Information Forensics and Security | - |
dc.subject | cryptography | - |
dc.subject | broadcast encryption | - |
dc.subject | identity-based broadcast encryption | - |
dc.subject | public key | - |
dc.title | Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TIFS.2014.2388156 | - |
dc.identifier.scopus | eid_2-s2.0-84923249651 | - |
dc.identifier.volume | 10 | - |
dc.identifier.issue | 3 | - |
dc.identifier.spage | 679 | - |
dc.identifier.epage | 693 | - |
dc.identifier.isi | WOS:000350151500002 | - |
dc.identifier.issnl | 1556-6013 | - |