Skip to main content
Log in

Identity-based broadcast encryption with shorter transmissions

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)-size ciphertexts. Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network. Finally, the proposed schemes are provable security under the decision generalized bilinear Diffi-Hellman (GBDH) assumption in the random oracles model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. Identity-based cryptosystems and signature schemes [C]// In Proc Crypto. Berlin: Springer-Verlag, 1985: 47–53.

    Google Scholar 

  2. Boneh D, Franklin M. Identity-based encryption from the Weil pairing [C]//In Proc Crypto. Berlin: Springer-Verlag, 2001: 213–229.

    Google Scholar 

  3. Boneh D, Boyen X. Efficient selective-ID secure identity based encryption without random oracles [C]//In Proc Eurocrypt. Berlin: Springer-Verlag, 2004: 223–238.

    Google Scholar 

  4. Boneh D, Boyen X. Secure identity based encryption without random oracles [C]//In Proc Eurocrypt. Berlin: Springer-Verlag, 2004: 443–459.

    Google Scholar 

  5. Waters B. Efficient identity-based encryption without random oracles [C]//In Proc Eurocrypt. Berlin: Springer-Verlag, 2005: 114–127.

    Google Scholar 

  6. Boneh D, Boyen X, Goh E J. Hierarchical identity based encryption with constant size ciphertext [C]//In Proc Eurocrypt. Berlin: Springer-Verlag, 2005: 440–456.

    Google Scholar 

  7. Fiat A, Naor M. Broadcast encryption [C]//In Proc Crypto. Springer-Verlag, 1993: 480–491.

  8. Dodis Y, Fazio N. Public key broadcast encryption for stateless receivers [C]//In Proc DRM. Berlin: Springer-Verlag, 2002: 61–80.

    Google Scholar 

  9. Dodis Y, Fazio N. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack [C]//In Proc PKC. Berlin: Springer-Verlag, 2003: 100–115.

    Google Scholar 

  10. Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys [C]//In Proc Crypto. Berlin: Springer-Verlag, 2005: 258–275.

    Google Scholar 

  11. Park J H, Kim H J, Lee D H, et al. Public key broadcast encryption schemes with shorter transmissions [J]. IEEE Transactions on Broadcasting (accepted).

  12. Delerablée C, Paillier P, Pointcheval D. Fully collusion secure dynamic broadcast encryption with constantsize ciphertexts or decryption keys [C]//In Proc Pairing. Berlin: Springer-Verlag, 2007:39–59.

    Google Scholar 

  13. Mu Y, Susilo W, Lin Y, et al. Identity-based authenticated broadcast encryption and distributed authenticated encryption [C]//In Proc ASLAN. Berlin: Springer-Verlag, 2004: 169–181.

    Google Scholar 

  14. Delerablée C. Identity-based broadcast encryption with constant size ciphertexts and private keys [C]//In Proc ASIACRYPT. Berlin: Springer-Verlag, 2007:200–215.

    Google Scholar 

  15. Chatterjee S, Sarkar P. Multi-receiver identity-based key encapsulation with shortened ciphertext [C]//In Proc INDOCRYPT. Berlin: Springer-Verlag, 2006: 394–408.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Le-you Zhang  (张乐友).

Additional information

Foundation item: the National Natural Science Foundation of China (Nos. 60673072, 60803149); the National Basic Research Program (973) of China (No. 2007CB311201)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, Ly., Hu, Yp. & Mu, Nb. Identity-based broadcast encryption with shorter transmissions. J. Shanghai Jiaotong Univ. (Sci.) 13, 641–645 (2008). https://doi.org/10.1007/s12204-008-0641-3

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-008-0641-3

Key words

CLC number

Navigation