Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

Identity based broadcast encryption based on one to many identity based proxy re-encryption

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
2 Author(s)
Xu An Wang ; Key Lab. of Inf. & Network Security, Eng. Coll. of Chinese Armed Police Force, Beijing, China ; Xiaoyuan Yang

Broadcast encryption schemes enable senders to efficiently broadcast ciphertexts to a large set of receivers in a way that only non-revoked receivers can decrypt them. Identity based broadcast encryption schemes are public key broadcast encryption using identity as the public key. In this paper, we show a novel way to construct identity based broadcast encryption. We introduce a new concept: one to many identity based proxy re-encryption. And we show how to construct efficient identity based broadcast encryption based on this primitive. Our scheme can achieve constant size public keys and private keys and linear size ciphertext. But our scheme no longer needs explicitly describing receiver set while all the other schemes need. Thus our scheme is an efficient broadcast encryption scheme compared with other schemes.

Published in:

Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on

Date of Conference:

8-11 Aug. 2009