Adaptively secure broadcast encryption under standard assumptions with better efficiency
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Kwangsu | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-04T16:19:16Z | - |
dc.date.available | 2021-09-04T16:19:16Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2015-05 | - |
dc.identifier.issn | 1751-8709 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/93625 | - |
dc.description.abstract | In this study, the authors present an efficient public-key broadcast encryption (PKBE) scheme with sub-linear size of public keys, private keys and ciphertexts and prove its adaptive security under standard assumptions. Compared with the currently best scheme of Garg et al. (CCS 2010) that provides adaptive security under standard assumptions and sub-linear size of various parameters, the ciphertext size of the author's scheme is 94% shorter and the encryption algorithm of their scheme is also 2.8 times faster than the scheme of Garg et al. To achieve their scheme, they adapt the dual system encryption technique of Waters. However, there is a challenging problem to use this technique for the construction of PKBE with sub-linear size of ciphertexts such as a tag compression problem. To overcome this problem, they first devise a novel tag update technique for broadcast encryption. Using this technique, they build an efficient PKBE scheme in symmetric bilinear groups, and prove its adaptive security under standard assumptions. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | INST ENGINEERING TECHNOLOGY-IET | - |
dc.subject | CONSTANT-SIZE CIPHERTEXTS | - |
dc.subject | IDENTITY-BASED ENCRYPTION | - |
dc.subject | DUAL SYSTEM ENCRYPTION | - |
dc.subject | SCHEMES | - |
dc.subject | HIBE | - |
dc.title | Adaptively secure broadcast encryption under standard assumptions with better efficiency | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Kwangsu | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1049/iet-ifs.2014.0102 | - |
dc.identifier.scopusid | 2-s2.0-84928015660 | - |
dc.identifier.wosid | 000353550300001 | - |
dc.identifier.bibliographicCitation | IET INFORMATION SECURITY, v.9, no.3, pp.149 - 157 | - |
dc.relation.isPartOf | IET INFORMATION SECURITY | - |
dc.citation.title | IET INFORMATION SECURITY | - |
dc.citation.volume | 9 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 149 | - |
dc.citation.endPage | 157 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | CONSTANT-SIZE CIPHERTEXTS | - |
dc.subject.keywordPlus | IDENTITY-BASED ENCRYPTION | - |
dc.subject.keywordPlus | DUAL SYSTEM ENCRYPTION | - |
dc.subject.keywordPlus | SCHEMES | - |
dc.subject.keywordPlus | HIBE | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.