By Topic

Identity based broadcast encryption based on one to many identity based proxy re-encryption

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Xu An Wang ; Key Lab. of Inf. & Network Security, Eng. Coll. of Chinese Armed Police Force, Beijing, China ; Xiaoyuan Yang

Broadcast encryption schemes enable senders to efficiently broadcast ciphertexts to a large set of receivers in a way that only non-revoked receivers can decrypt them. Identity based broadcast encryption schemes are public key broadcast encryption using identity as the public key. In this paper, we show a novel way to construct identity based broadcast encryption. We introduce a new concept: one to many identity based proxy re-encryption. And we show how to construct efficient identity based broadcast encryption based on this primitive. Our scheme can achieve constant size public keys and private keys and linear size ciphertext. But our scheme no longer needs explicitly describing receiver set while all the other schemes need. Thus our scheme is an efficient broadcast encryption scheme compared with other schemes.

Published in:

Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on

Date of Conference:

8-11 Aug. 2009