Broadcast Encryption Scheme Based on 3-Dimensional Orthogonal Vectors

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme

In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of attributes, and a list of the identities of revoked users. Only recipients who have attributes which satisfy the access policy and whose identity is not in the list of revoked users will be...

متن کامل

Attribute-Based Broadcast Encryption Scheme Made Efficient

In this paper, we describe a new broadcast encryption scheme for stateless receivers. The main difference between our scheme and the classical ones derived from the complete subtree paradigm is that the group of privileged users is described by attributes. Actually, some real applications have been described where the use of a more adaptable access structure brings more efficiency and ease of d...

متن کامل

Broadcast Encryption Scheme π ?

We propose a new broadcast encryption scheme π based on the idea of ‘one key per each punctured interval’. Let N and r be the numbers of total users and revoked users, respectively. In our scheme with p-punctured c-intervals, the transmission overhead is asymptotically r p+1 as r grows. We also introduce two variants of our scheme to improve the efficiency for small r. Our scheme is very flexib...

متن کامل

Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF

We describe a broadcast encryption system with revocation, where security is based on PUF (Physical Unclonable Function) instead of a cryptographic problem. Our scheme is immune to advances of cryptography (which may suddenly ruin any system depending solely of cryptographic assumptions). It is resilient to collusion attacks, which are frequently the Achilles’ heel of schemes based on cryptogra...

متن کامل

On the Security of An Identity Based Broadcast Encryption Scheme

Recently, Ren and Gu proposed a new identity-based broadcast encryption scheme, and claimed that their scheme is secure against chosen-ciphertext attack in the standard model. However, by giving a concrete attack, we indicate that Ren and Gu’s scheme is even not secure against chosen-plaintext attack. Keywordsidentity based broadcast encryption, chosen-ciphertext attack, chosen-plaintext attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Energy Procedia

سال: 2011

ISSN: 1876-6102

DOI: 10.1016/j.egypro.2011.11.115