International Conference on Computational and Information Science

CIS 2005: Computational Intelligence and Security pp 1092-1097

Broadcast Encryption Using Identity-Based Public-Key Cryptosystem

  • Lv Xixiang
  • Bo Yang
Conference paper

DOI: 10.1007/11596981_163

Volume 3802 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Xixiang L., Yang B. (2005) Broadcast Encryption Using Identity-Based Public-Key Cryptosystem. In: Hao Y. et al. (eds) Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science, vol 3802. Springer, Berlin, Heidelberg

Abstract

In this paper, a new public-key broadcast encryption scheme, which is asymmetric and without involvement of trusted third parties, is proposed by using the “subset-cover” framework and the identity-based encryption scheme of Boneh and Franklin. This scheme is the first concrete construction of an asymmetric identity-based public-key broadcast encryption that does not rely on trusted agents and the costly Oblivious Polynomial Evaluation mechanism. Moreover, this novel work contains other desirable features, such as efficient encryption and decryption, low memory requirements, traitor tracing, asymmetry and non-repudiation. The tracing algorithm of this system is more efficient than that of the previous ones.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Lv Xixiang
    • 1
  • Bo Yang
    • 2
  1. 1.National key lab of ISNXidian UniversityXi’anChina
  2. 2.College of InformationSouth China Agricultural UniversityGuangzhouChina