نتایج جستجو برای: broadcast encryption

تعداد نتایج: 56272  

2014
Jin SUN Yupu HU Shangping WANG

According to the broadcast encryption scheme with wide applications in the real world, a fully secure predicate-based broadcast encryption was proposed by combining with Waters dual system encryption, predicate encryption and the orthogonality property of composite-order bilinear groups. Based on the standard model, the scheme can achieve constant-size key and ciphertext, and guarantee the secu...

2000
Juan A. Garay Jessica Staddon Avishai Wool

In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually held in a “tamperresistant,” replaceable, smartcard. A coalition of users may attack such a system by breaking their smartcards open, extracting the keys, and building “pirate decoders” based on the decryption keys they...

2006
Nuttapong Attrapadung Jun Furukawa Hideki Imai

We introduce a primitive called Hierarchical Identity-Coupling Broadcast Encryption (HICBE) that can be used for constructing efficient collusion-resistant public-key broadcast encryption schemes with extended properties such as forward-security and keyword-searchability. Our forward-secure broadcast encryption schemes have small ciphertext and private key sizes, in particular, independent of t...

Journal: :JCP 2010
Liang Hu Zheli Liu Xiaochun Cheng

We propose a new efficient identity-based broadcast encryption scheme without random oracles and prove that it achieves selective identity, chosen plaintext security. Our scheme is constructed based on bilinear Diffie-Hellman inversion assumption and it is a good efficient hybrid encryption scheme, which achieves O(1)-size ciphertexts, public parameters and constant size private keys. In our sc...

Journal: :IACR Cryptology ePrint Archive 2017
Jihye Kim Seunghwa Lee Jiwon Lee Hyunok Oh

Public key broadcast encryption is a cryptographic method to securely transmit a message from anyone to a group of receivers such that only privileged users can decrypt it. A secure multicast system allows a user to send a message to a dynamically changing group of users. The secure multicast can be realized by the broadcast encryption. In this paper, we propose a novel combinatorial subset dif...

2000
Silja Mäki

Pay-per-view television, music transmissions, and computer programmes may be addressed to a wide but still restricted audience. Broadcast encryption can be used to address the contents of a transmission to registered and paying receivers only. To discourage the users from replicating their decryption keys, traitor tracing broadcast encryption schemes were introduced. Even further properties are...

2006
Li Lu Lei Hu

The growth of the Internet has triggered tremendous opportunities for broadcast service. However, the security issue of the broadcast has not been properly addressed. In this paper, we propose a new multi-recipient public key encryption scheme called ”Pairing-Based Multi-Recipient Encryption” (PBMRE)to achieve a secure broadcast transmission. In PBMRE, a ciphertext encrypted by an encryption ke...

Journal: :JNW 2014
Hao Wang Lei Wu

Anonymous is one of the most important security properties for kinds of Internet applications. In this paper, we consider the privacy-preserving problem in the context of public key broadcast encryption. We provide a new security definition for anonymous public key broadcast encryption, and construct a new scheme. To achieve anonymous, we blind the ciphertexts using the random factors. Moreover...

Journal: :Journal of Mathematical Cryptology 2007

Journal: :IACR Cryptology ePrint Archive 2012
Nelly Fazio Irippuge Milinda Perera

In the standard setting of broadcast encryption, information about the receivers is transmitted as part of the ciphertext. In several broadcast scenarios, however, the identities of the users authorized to access the content are often as sensitive as the content itself. In this paper, we propose the first broadcast encryption scheme with sublinear ciphertexts to attain meaningful guarantees of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید