P2P Social Network with Dynamic Identity-based Broadcast Encryption using Rolls

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree

In this paper, we suggest the security tree scheme using dynamic identity-based broadcast encryption, using this scheme, it is possible to parted a message to many linked nodes and represent these nodes as security tree and give every receiver permission to read special linked nodes from security tree. General Terms Online Social Website is stretched over worldwide such as Facebook, Linked In; ...

متن کامل

P2P Social Networks with Broadcast Encryption Protected Privacy

Existing centralized, provider-dependent networks do not provide users with mechanisms to fully protect their data. The provider has complete control of the service, and users have to rely on security mechanisms provided by the service. There is no guarantee that the trusted provider will enforce the privacy preferences of the users. Besides, there can be data mining, targeted advertisements, a...

متن کامل

Lattice-based Identity-Based Broadcast Encryption

Motivated by the lattice basis delegation technique due to [8], we propose an adaptively secure identity-based broadcast encryption(IBBE) scheme based on the hard worst-case lattice problems. Our construction can be generalized to a hierarchical IBBE (HIBBE) easily. Using the method in [1], we also modify our basic construction to obtain an IBBE in the standard model. To the best of the authors...

متن کامل

Augmented Broadcaster Identity-based Broadcast Encryption

Identity-based Broadcast Encryption (IBBE) has the inherent key escrow problem that Private Key Generator (PKG) can fully determine the user’s private key, which is an obstacle of the application of IBBE. The existing approaches to solving key escrow problem need the user to submit identity to multiple PKGs or interactions between PKG and the user in the private key extraction phase. For Point-...

متن کامل

Generalized Identity Based and Broadcast Encryption Schemes

We provide a general framework for constructing identitybased and broadcast encryption systems. In particular, we construct a general encryption system called spatial encryption from which many systems with a variety of properties follow. The ciphertext size in all these systems is independent of the number of users involved and is just three group elements. Private key size grows with the comp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2014

ISSN: 0975-8887

DOI: 10.5120/17818-8753