Half-Broadcast Encryption for Anonymity
نویسندگان
چکیده
Broadcast Encryption(BE) have been widely used to pay TV, distributed systems and others. In general concept of this encryption, most BE schemes have to broadcast all packets to all network because of intermediate nodes cannot know accurate nodes needing broadcasted packets due to encryption. In this paper, we propose Half-Broadcast Encryption(HBE). Recently, a number of distributed systems have been designed as hierarchical model composed of several levels. In the model, HBE communicates as top-down with reducing logwgbn traffic than general broadcast encryption. In the proposed scheme, intermediate nodes decides whether they broadcast received packets with protecting anonymity of destinations. For the reason, HBE can reduce the packets over the network to more than half due to flexible broadcasting without any identity of destination.
منابع مشابه
Privacy-preserving multireceiver ID-based encryption with provable security
Multireceiver identity (ID) based encryption and ID-based broadcast encryption allow a sender to use the public identities of multiple receivers to encrypt messages so that only the selected receivers or a privileged set of users can decrypt the messages. It can be used for many practical applications such as digital content distribution, pay-per-view and multicast communication. For protecting...
متن کاملAnonymity and Time in Public-Key Encryption
In a world that is increasingly relying on digital technologies, the ability to securely communicate and distribute information is of crucial importance. Cryptography plays a key role in this context and the research presented in this thesis focuses on developing cryptographic primitives whose properties address more closely the needs of users. We start by considering the notion of robustness i...
متن کاملAnonymous trace and revoke
A broadcast encryption (BE) scheme is amethod for encryptingmessages in away that only a set of privileged users can decrypt it. Anonymity in a BE system is to hide any information on the privileged set. This problem has very recently had some attention and some constructions are proposed to achieve anonymity. However, anonymity in a trace and revoke (TR) scheme has not been studied yet, and to...
متن کاملAn Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model
In broadcast encryption schemes, a distribution center broadcasts an encrypted message to a subset S chosen from a universe of receivers and only the intended users are able to decrypt the message. Most broadcast encryption schemes do not provide anonymity and the identities of target receivers are sent in plaintext. However, in several applications, the authorized users’ identities has the sam...
متن کاملOutsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
In the standard setting of broadcast encryption, information about the receivers is transmitted as part of the ciphertext. In several broadcast scenarios, however, the identities of the users authorized to access the content are often as sensitive as the content itself. In this paper, we propose the first broadcast encryption scheme with sublinear ciphertexts to attain meaningful guarantees of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012