Broadcast encryption using identity-based public-key cryptosystem

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, a new public-key broadcast encryption scheme, which is asymmetric and without involvement of trusted third parties, is proposed by using the "subset-cover" framework and the identity-based encryption scheme of Boneh and Franklin. This scheme is the first concrete construction of an asymmetric identity-based public-key broadcast encryption that does not rely on trusted agents and the costly Oblivious Polynomial Evaluation mechanism. Moreover, this novel work contains other desirable features, such as efficient encryption and decryption, low memory requirements, traitor tracing, asymmetry and non-repudiation. The tracing algorithm of this system is more efficient than that of the previous ones. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Lv, X., & Bo, Y. (2005). Broadcast encryption using identity-based public-key cryptosystem. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3802 LNAI, pp. 1092–1097). https://doi.org/10.1007/11596981_163

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free