Abstract
This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)-size ciphertexts. Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network. Finally, the proposed schemes are provable security under the decision generalized bilinear Diffi-Hellman (GBDH) assumption in the random oracles model.
Similar content being viewed by others
References
Shamir A. Identity-based cryptosystems and signature schemes [C]// In Proc Crypto. Berlin: Springer-Verlag, 1985: 47–53.
Boneh D, Franklin M. Identity-based encryption from the Weil pairing [C]//In Proc Crypto. Berlin: Springer-Verlag, 2001: 213–229.
Boneh D, Boyen X. Efficient selective-ID secure identity based encryption without random oracles [C]//In Proc Eurocrypt. Berlin: Springer-Verlag, 2004: 223–238.
Boneh D, Boyen X. Secure identity based encryption without random oracles [C]//In Proc Eurocrypt. Berlin: Springer-Verlag, 2004: 443–459.
Waters B. Efficient identity-based encryption without random oracles [C]//In Proc Eurocrypt. Berlin: Springer-Verlag, 2005: 114–127.
Boneh D, Boyen X, Goh E J. Hierarchical identity based encryption with constant size ciphertext [C]//In Proc Eurocrypt. Berlin: Springer-Verlag, 2005: 440–456.
Fiat A, Naor M. Broadcast encryption [C]//In Proc Crypto. Springer-Verlag, 1993: 480–491.
Dodis Y, Fazio N. Public key broadcast encryption for stateless receivers [C]//In Proc DRM. Berlin: Springer-Verlag, 2002: 61–80.
Dodis Y, Fazio N. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack [C]//In Proc PKC. Berlin: Springer-Verlag, 2003: 100–115.
Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys [C]//In Proc Crypto. Berlin: Springer-Verlag, 2005: 258–275.
Park J H, Kim H J, Lee D H, et al. Public key broadcast encryption schemes with shorter transmissions [J]. IEEE Transactions on Broadcasting (accepted).
Delerablée C, Paillier P, Pointcheval D. Fully collusion secure dynamic broadcast encryption with constantsize ciphertexts or decryption keys [C]//In Proc Pairing. Berlin: Springer-Verlag, 2007:39–59.
Mu Y, Susilo W, Lin Y, et al. Identity-based authenticated broadcast encryption and distributed authenticated encryption [C]//In Proc ASLAN. Berlin: Springer-Verlag, 2004: 169–181.
Delerablée C. Identity-based broadcast encryption with constant size ciphertexts and private keys [C]//In Proc ASIACRYPT. Berlin: Springer-Verlag, 2007:200–215.
Chatterjee S, Sarkar P. Multi-receiver identity-based key encapsulation with shortened ciphertext [C]//In Proc INDOCRYPT. Berlin: Springer-Verlag, 2006: 394–408.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: the National Natural Science Foundation of China (Nos. 60673072, 60803149); the National Basic Research Program (973) of China (No. 2007CB311201)
Rights and permissions
About this article
Cite this article
Zhang, Ly., Hu, Yp. & Mu, Nb. Identity-based broadcast encryption with shorter transmissions. J. Shanghai Jiaotong Univ. (Sci.) 13, 641–645 (2008). https://doi.org/10.1007/s12204-008-0641-3
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12204-008-0641-3