By Topic

Identity-based Broadcast Encryption Scheme with Untrusted PKG

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Shanqing Guo ; Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan ; Chunhua Zhang

An identity-based broadcast encryption cryptosystem enable senders to efficiently broadcast cipher texts to a large set of receivers, which can use arbitrary strings as public keys. In this kind of cryptosystem, if the Private Key Generator (PKG) is untrusted, you may suddenly learn that a private key corresponding to your Identity is used to decrypt some ciphertexts. What causes it happens? Except a key compromise, perhaps it must be the PKG who is acting dishonestly and trying to make malicious activities by selling your key, which is a key escrow problem. In order to solve it, we introduce the concept of Accountable Authority Identity Based Broadcast Encryption (AA-IBBE) and design a concrete scheme, which is a new approach to mitigate the key escrow problem existing by restricting the ways in which the PKG can misbehave in identity based broadcast encryption schemes. Lastly we also give its correctness proof and security analysis.

Published in:

Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for

Date of Conference:

18-21 Nov. 2008