Broadcast Encryption Using Identity-Based Public-Key Cryptosystem

* Final gross prices may vary according to local VAT.

Get Access


In this paper, a new public-key broadcast encryption scheme, which is asymmetric and without involvement of trusted third parties, is proposed by using the “subset-cover” framework and the identity-based encryption scheme of Boneh and Franklin. This scheme is the first concrete construction of an asymmetric identity-based public-key broadcast encryption that does not rely on trusted agents and the costly Oblivious Polynomial Evaluation mechanism. Moreover, this novel work contains other desirable features, such as efficient encryption and decryption, low memory requirements, traitor tracing, asymmetry and non-repudiation. The tracing algorithm of this system is more efficient than that of the previous ones.

This work is supported by the fund of national nature science: Study on Traitor Tracing (60372046) and the fund of the key lab of the national defence science and technology: Study on the mobile electronic commerce security (51436040204DZ0102).