Broadcast Encryption Scheme π ?
نویسندگان
چکیده
We propose a new broadcast encryption scheme π based on the idea of ‘one key per each punctured interval’. Let N and r be the numbers of total users and revoked users, respectively. In our scheme with p-punctured c-intervals, the transmission overhead is asymptotically r p+1 as r grows. We also introduce two variants of our scheme to improve the efficiency for small r. Our scheme is very flexible with two parameters p and c. We may take p as large as possible if a user device allows a large key storage, and set c as small as possible if the storage size and the computing power is limited. Our scheme also possesses another remarkable feature that any number of new users can join at any time without key refreshment, which is not possible in other known practical schemes.
منابع مشابه
Design and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملForward-Secure Identity-based Broadcast Encryption Scheme from Lattice
Motivated by an identity-based broadcast encryption scheme from lattice[1] and a forward-secure identity-based encryption scheme[2], we propose a forward-secure identity-based broadcast encryption scheme from lattice by adding the forward-security mechanism on broadcast encryption scheme. Our scheme satisfies the security requirements of both the broadcast encryption scheme and forward-security...
متن کاملGolden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing
Broadcast encryption is conventionally formalized as broadcast encapsulation in which, instead of a ciphertext, a session key is produced, which is required to be indistinguishable from random. Such a scheme can provide public encryption functionality in combination with a symmetric encryption through the hybrid encryption paradigm. The Boneh-Gentry-Waters scheme of 2005 proposed a broadcast sc...
متن کاملOn the Security of An Identity Based Broadcast Encryption Scheme
Recently, Ren and Gu proposed a new identity-based broadcast encryption scheme, and claimed that their scheme is secure against chosen-ciphertext attack in the standard model. However, by giving a concrete attack, we indicate that Ren and Gu’s scheme is even not secure against chosen-plaintext attack. Keywordsidentity based broadcast encryption, chosen-ciphertext attack, chosen-plaintext attack...
متن کامل2-Subset Difference Scheme for Broadcast Encryption
Abstract. Broadcast Encryption allows a center to broadcast encrypted messages to a set of users so that only privileged users can decrypt them. In this paper, we propose an efficient broadcast encryption scheme based on the “Subset Difference” (SD) scheme. It reduces the transmission overhead by 50 percent while the storage overhead remains the same but the computational overhead somewhat incr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005