Adaptively Secure Identity-Based Threshold Broadcast Encryption without Random Oracles

Article Preview

Abstract:

A mobile ad hoc network has the computational and energy constraints, the general threshold cryptography does not suit it. In this paper, we consider a new kind of proper public encryption to the ad hoc networks: threshold broadcast encryption. A new construction of identity-based threshold broadcast encryption is proposed. In the proposed scheme, any user can dynamically join the system as a possible recipient, and the sender can dynamically choose the set of recipients and the threshold value t. Our new scheme achieves constant size private keys and O(n-t)-size ciphertexts. This is the first scheme which achieves short ciphertexts and full security in the standard model. Finally, we also show that it is provable security under n+1-Weak Decision Bilinear Diffie-Hellman Exponent (n+1-wDBDHE) assumption.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 143-144)

Pages:

347-352

Citation:

Online since:

October 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. Fiat, M. Naor, Broadcast encryption. In proceedings of CRYPTO 1993, LNCS 773, 1994, Berlin: Springer-Verlag, pp.480-491.

Google Scholar

[2] H. Ghodosi, J. Pieprzyk and R. Safavi-Naini, Dynamic threshold cryptosystems: a new scheme in group oriented cryptography. In proceedings of Pragocrypt 96, CTU Publishing House, 1996, pp.370-379.

Google Scholar

[3] Z. Chai, Z Cao. and Y. Zhou. Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network. In proceedings of IMSCCS 06, Volume 2, IEEE Computer Society, 2006, pp.148-154.

DOI: 10.1109/imsccs.2006.217

Google Scholar

[4] V. Daza, J. Herranz and P. Morillo etal, CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. In proceedings of ProvSec 2007, LNCS 4784, Berlin: Springer-Verlag, 2007, pp.35-50.

DOI: 10.1007/978-3-540-75670-5_3

Google Scholar

[5] C. Delerablée and D. Pointcheval, Dynamic Threshold Public-Key Encryption. In proceedings of CRYPTO 2008, LNCS 5157, Berlin: Springer-Verlag, 2008, pp.317-334.

DOI: 10.1007/978-3-540-85174-5_18

Google Scholar

[6] D. Boneh, X. Boyen, and Eu-Jin Goh. Hierarchical Identity Based Encryption with Constant Size Ciphertext. In proceedings of EUROCRYPT 2005, LNCS 3494, Berlin: Springer-Verlag, 2005, pp.440-456.

DOI: 10.1007/11426639_26

Google Scholar