期刊文献+

Identity-based Broadcast Encryption with Shorter Transmissions 被引量:2

Identity-based Broadcast Encryption with Shorter Transmissions
原文传递
导出
摘要 This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphertexts. Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network. Finally, the proposed schemes are provable security under the decision generalized bilinear Diffi-Hellman (GBDH) assumption in the random oracles model. This paper describes two identity-based broadcast encryption(IBBE) schemes for mobile ad hoc networks.The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)-size ciphertexts.Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network.Finally, the proposed schemes are provable security under the decision generalized bilinear Di?-Hellman(GBDH) assumption in the random oracles model.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期641-645,共5页 上海交通大学学报(英文版)
基金 the National Natural Science Foundation of China (Nos. 60673072, 60803149) the National Basic Research Program (973) of China(No. 2007CB311201)
关键词 broadcast encryption identity-based encryption short transmissions provable security 广播编密码 密码识别 短传输 可证明安全
  • 相关文献

参考文献10

  • 1Dodis Y,Fazio N.Public key trace and revoke scheme secure against adaptive chosen ciphertext at- tack[].Proc PKC.2003
  • 2Park J H,Kim H J,Lee D H, et al.Public key broad- cast encryption schemes with shorter transmissions[].IEEE Transactions on Broadcasting.
  • 3Delerabl′ee C,Paillier P,Pointcheval D.Fully collusion secure dynamic broadcast encryption with constant- size ciphertexts or decryption keys[].Proc Pair- ing.2007
  • 4Mu Y,Susilo W,Lin Y, et al.Identity-based au- thenticated broadcast encryption and distributed au- thenticated encryption[].Proc ASLAN.2004
  • 5Delerabl′ee C.Identity-based broadcast encryption with constant size ciphertexts and private keys[].Proc ASIACRYPT.2007
  • 6Chatterjee S,Sarkar P.Multi-receiver identity-based key encapsulation with shortened ciphertext[].Proc INDOCRYPT.2006
  • 7Shamir A.Identity-Based Cryptosystems and Signature Schemes[].Proc of Crypto’.1985
  • 8Boneh,D.,Franklin,M.Identity-based encryption from the Weil pairing[].Proceedings of Crypto’.2001
  • 9D Boneh,X Boyen.Efficient selective ID secure identity based encryption without random Oracles[].Advances in Cryptology—Euroerypt‘.2004
  • 10D Boneh,X Boyen.Secure identity based encryption without random oracles[].Advances in Cryptology-Crypto‘.2004

同被引文献18

  • 1沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 2SHERMAN A T, MCGREW D A. Key establishment in large dynamic groups using one-way function trees[J]. IEEE Transactions on Software Engineering, 2003, 29(5): 444-458.
  • 3YANG G, WANG J, CHENG H, et al. An identity-based encryption scheme for broadcasting[A]. NPC 2007[C]. Dalian, China, 2007.123-126.
  • 4JIANG Y X, LIN C, sm M H, et al. Self-healing group key distribution with time-limited node revocation for wireless sensor networks[J]. Security Issues in Sensor and Ad Hoc Networks, 2007, 5(1): 14-23.
  • 5DUTTA R, CHANG E C, MUKHOPADHYAY S. Efficient selfhealing key distribution with revocation for wireless sensor networks using one way key chains[A]. LNCS 4521[C]. Zhuhai, China, 2007. 385-400.
  • 6冯涛,马剑锋.基于单向累加器的移动ad hoe网络组密钥管理方案[J].通信学报,2007,28(11A):103-107.
  • 7马春光,王九如,钟晓睿等.基于单向累加器的传感网密钥管理协议[J].通信学报,2011,31(11A):184-189.
  • 8BENALOH J, MARE M D. One-way accumulators: a decentralized alternative to digital signatures[A]. EUROCRYPT'93 Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology[C]. New York, USA, 1994.274-285.
  • 9BARIC N, PFITZMANN B. Collision-free accumulators and fail-stop signature schemes without trees[A]. The 16th Annual International Conference on Theory and Application of Cryptographic Techniques[C]. Konstanz, Germany, 1997.480-494.
  • 10GOODRICH M T, TAMASSlA R, HASIC J. An efficient dynamic and distributed cryptographic accumulator[A]. The 5th International Conference on Information Security[C]. Springer-Verlag London, UK, 2002.372-388.

引证文献2

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部