Identity-based authenticated broadcast encryption and distributed authenticated encryption

43Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Since its introduction, broadcast encryption has attracted many useful applications. In this paper, we propose two identity-based schemes for authenticated broadcasting and distributed message authentication. The first scheme supports multiple broadcasters and allows each broadcaster to dynamically broadcast messages into an arbitrary group of receivers determined by the broadcaster. The receivers can obtain the broadcasted message using the identity of the broadcaster and his own secret decryption key; hence it ensures both confidentiality and authenticity of the message. The second scheme allows users (receivers) to send messages back to the broadcaster where the authentication of messages is done with the identity of the user. We also provide security proofs for our schemes under the random oracle model. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Mu, Y., Susilo, W., Lin, Y. X., & Ruan, C. (2004). Identity-based authenticated broadcast encryption and distributed authenticated encryption. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3321, 169–181. https://doi.org/10.1007/978-3-540-30502-6_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free