Skip to main content
Log in

Identity Based Broadcast Encryption Scheme with Shorter Decryption Keys for Open Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In Broadcast Encryption schemes, a sender can broadcast the encrypted message securely in a threatening network to a set of legitimate system users only. In IBE scheme any sender can encrypt the desired message using his/her identity without attaining the public key certificate. Here, we have presented an efficient ID-based broadcast encryption scheme (IBBE) for open networks. In this scheme, desired messages can be broadcasted to any subset of the users by any sender but only authorized receivers are capable in retrieving the encrypted messages. This scheme has shorter decryption keys in comparison with other primitive of IBBE scheme for open networks. Moreover, the proposed scheme intends to achieve the lower cost for computation as well as transmission in comparison to earlier existing IBBE schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Fiat, A., & Naor, M. (1993). Broadcast encryption. In Proceedings of Crypto’93, volume 773 of LNCS (pp 480–491). Springer.

  2. Boneh, D., Gentry, C., & Waters, B. (2005). Collusion resistant Broadcast Encryption with short cipher texts and private keys. In Proceedings of Crypto’05, volume 3621 of LNCS (pp. 258–275).

  3. Delerablée, C., Paillier, P., & Pointcheval, D. (2007). Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In Pairing-based cryptography–pairing 2007 (pp. 39–59), Springer.

  4. Boneh, D., Sahai, A., & Waters, B. (2006). Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT 2006 (vol. 4004, pp. 573–592). Heidelberg: LNCS, Springer.

  5. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Advances in cryptology (pp. 47–53).

  6. Boneh, D., & Franklin, M. (2003). Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32, 586–615.

    MathSciNet  MATH  Google Scholar 

  7. Gentry, C. (2006). Practical identity-based encryption without random oracles. In Advances in Cryptology-EUROCRYPT 2006 (pp. 445–464). Springer.

  8. Sakai, R., & Furukawa, J. (2007). Identity-based broadcast encryption. IACR Cryptology ePrint Archive, 2007, 217.

    Google Scholar 

  9. Delerablée, C. (2007). Identity-based broadcast encryption with constant size ciphertexts and private keys. In Advances in cryptologyASIACRYPT 2007 (pp. 200–215). Springer.

  10. Boneh, D., Waters, B., & Zhandry, M. (2014). Low overhead broadcast encryption from multilinear maps. In Advances in cryptology—CRYPTO 2014 (pp. 206–223). Springer.

  11. Li, X., & Yanli, R. (2014). Efficient anonymous identity-based broadcast encryption without random oracles. International Journal of Digital Crime and Forensics (IJDCF), 6, 40–51.

    Article  Google Scholar 

  12. Kim, J., Susilo, W., Au, M. H., & Seberry, J. (2015). Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext. IEEE Transactions on Information Forensics and Security, 10, 679–693.

    Google Scholar 

  13. Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J. & Farras, O. (2011). Bridging broadcast encryption and group key agreement. In Advances in cryptology–ASIACRYPT 2011 (pp. 143–160), Springer.

  14. Wu, Q., Mu, Y., Susilo, W., Qinand, B., & Domingo-Ferrer, J. (2009). Asymmetric group key agreement. In Advances in cryptology—EUROCRYPT 2009 (pp. 153–170). Springer.

  15. Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. In EUROCRYPT 2003 (Vol. 2656, pp. 416–432). Heidelberg: LNCS, Springer.

  16. Li, M. C., Xu, X., Zhuang, R., Guo, C., & Tan, X. (2015). Identity based broadcast encryption schemes for open networks. In 9th international conference on frontier of computer science & technology. https://doi.org/10.1109/fcsc.2015.20.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pragya Mishra.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mishra, P., Renuka & Verma, V. Identity Based Broadcast Encryption Scheme with Shorter Decryption Keys for Open Networks. Wireless Pers Commun 115, 961–969 (2020). https://doi.org/10.1007/s11277-020-07606-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07606-6

Keywords

Navigation