Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Adaptively secure broadcast encryption under standard assumptions with better efficiency

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Kwangsu-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-04T16:19:16Z-
dc.date.available2021-09-04T16:19:16Z-
dc.date.created2021-06-18-
dc.date.issued2015-05-
dc.identifier.issn1751-8709-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/93625-
dc.description.abstractIn this study, the authors present an efficient public-key broadcast encryption (PKBE) scheme with sub-linear size of public keys, private keys and ciphertexts and prove its adaptive security under standard assumptions. Compared with the currently best scheme of Garg et al. (CCS 2010) that provides adaptive security under standard assumptions and sub-linear size of various parameters, the ciphertext size of the author's scheme is 94% shorter and the encryption algorithm of their scheme is also 2.8 times faster than the scheme of Garg et al. To achieve their scheme, they adapt the dual system encryption technique of Waters. However, there is a challenging problem to use this technique for the construction of PKBE with sub-linear size of ciphertexts such as a tag compression problem. To overcome this problem, they first devise a novel tag update technique for broadcast encryption. Using this technique, they build an efficient PKBE scheme in symmetric bilinear groups, and prove its adaptive security under standard assumptions.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherINST ENGINEERING TECHNOLOGY-IET-
dc.subjectCONSTANT-SIZE CIPHERTEXTS-
dc.subjectIDENTITY-BASED ENCRYPTION-
dc.subjectDUAL SYSTEM ENCRYPTION-
dc.subjectSCHEMES-
dc.subjectHIBE-
dc.titleAdaptively secure broadcast encryption under standard assumptions with better efficiency-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Kwangsu-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1049/iet-ifs.2014.0102-
dc.identifier.scopusid2-s2.0-84928015660-
dc.identifier.wosid000353550300001-
dc.identifier.bibliographicCitationIET INFORMATION SECURITY, v.9, no.3, pp.149 - 157-
dc.relation.isPartOfIET INFORMATION SECURITY-
dc.citation.titleIET INFORMATION SECURITY-
dc.citation.volume9-
dc.citation.number3-
dc.citation.startPage149-
dc.citation.endPage157-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusCONSTANT-SIZE CIPHERTEXTS-
dc.subject.keywordPlusIDENTITY-BASED ENCRYPTION-
dc.subject.keywordPlusDUAL SYSTEM ENCRYPTION-
dc.subject.keywordPlusSCHEMES-
dc.subject.keywordPlusHIBE-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE