Abstract
This paper presents a new efficient identity-based broadcast encryption scheme using bilinear mapping. Both private-key storage for one authorized user (only two group elements) and communication transmission bandwidth (three group elements) in our scheme are of constant size regardless of the number of colluders. In terms of efficiency and security, our scheme is very efficient with lower encryption and decryption computational cost and more secure against k number of colluders by introducing self-enforcing protection strategy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Berkovits, S.: How to Broadcast a Secret. In: Banâtre, J.-P., Le Métayer, D. (eds.) Research Directions in High-Level Parallel Programming Languages 1991. LNCS, vol. 574, pp. 536–541. Springer, Heidelberg (1992)
Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)
Stinson, D.R., Wei, R.: Key Preassigned Traceability Schemes for Broadcast Encryption. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 144–156. Springer, Heidelberg (1999)
Halevi, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47–60. Springer, Heidelberg (2002)
D’Arco, P., Stinson, D.R.: Fault Tolerant and DistributedBroadcast Encryption. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 263–280. Springer, Heidelberg (2003)
Dwork, C., Lotspiech, J., Naor, M.: Digital Signets: Self-Enforcing Protection of Digital Content. In: Proceedings of the 28th Symposium on the Theory of Computation, pp. 489–498 (1996)
Du, X., Wang, Y., Ge, J., Wang, Y.M.: An ID-based broadcast encryption for key distribution. IEEE Transactions on broadcasting 51(2), 264–266 (2005)
Mu, Y., Susilo, W., Lin, Y.-X.: Identity-Based Broadcasting. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 177–190. Springer, Heidelberg (2003)
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, C., Cheng, X., Ma, W., Wang, X. (2006). A New ID-Based Broadcast Encryption Scheme. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds) Autonomic and Trusted Computing. ATC 2006. Lecture Notes in Computer Science, vol 4158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11839569_47
Download citation
DOI: https://doi.org/10.1007/11839569_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38619-3
Online ISBN: 978-3-540-38622-3
eBook Packages: Computer ScienceComputer Science (R0)