Paper Title:
Adaptively Secure Identity-Based Threshold Broadcast Encryption without Random Oracles
  Abstract

A mobile ad hoc network has the computational and energy constraints, the general threshold cryptography does not suit it. In this paper, we consider a new kind of proper public encryption to the ad hoc networks: threshold broadcast encryption. A new construction of identity-based threshold broadcast encryption is proposed. In the proposed scheme, any user can dynamically join the system as a possible recipient, and the sender can dynamically choose the set of recipients and the threshold value t. Our new scheme achieves constant size private keys and O(n-t)-size ciphertexts. This is the first scheme which achieves short ciphertexts and full security in the standard model. Finally, we also show that it is provable security under n+1-Weak Decision Bilinear Diffie-Hellman Exponent (n+1-wDBDHE) assumption.

  Info
Periodical
Advanced Materials Research (Volumes 143-144)
Edited by
H. Wang, B.J. Zhang, X.Z. Liu, D.Z. Luo, S.B. Zhong
Pages
347-352
DOI
10.4028/www.scientific.net/AMR.143-144.347
Citation
L. Y. Zhang, Y. P. Hu, Q. Wu, "Adaptively Secure Identity-Based Threshold Broadcast Encryption without Random Oracles", Advanced Materials Research, Vols. 143-144, pp. 347-352, 2011
Online since
October 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Le You Zhang, Qing Wu, Yu Pu Hu
Abstract:Using a biometric as an identity has the advantage that identities are unique if the underlying biometric is of a good quality, such as...
3350
Authors: Qing Wu, Su Xia Sun
Abstract:In this paper, a new construct of hierarchical identity-based signature(HIBS) scheme is proposed at first. It has many advantages over those...
1356
Authors: Le You Zhang, Qing Wu, Yu Pu Hu
Chapter 3: Signal Processing
Abstract:Biometric measurements are noisy and the existing techniques cannot be used directly to construct biometric-based scheme. Hence an...
474
Authors: Qing Wu
Chapter 1: Mechatronics and Automation
Abstract:Using a biometric as an identity has the advantage that identities are unique if the underlying biometric is of a good quality, such as...
112
Authors: Hai Lin Xu, Yang Lu
Chapter 2: Information Technologies and Information Processing Algorithms
Abstract:Certificate-based encryption is a new paradigm which was introduced by Gentry to address the complex public key revocation problem in...
1971