A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme

Jong Hwan Park, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

We offer an alternative Public Key Broadcast Encryption (PKBE) scheme which is fully collusion-secure. Our construction is based on the method for generating private keys in the Boneh, Boyen and Goh's hierarchical identity-based encryption scheme. Our scheme provides a trade-off between ciphertext size and public key size. With appropriate parametrization we achieve a PKBE scheme where both ciphertexts and private keys are sublinear size for any subset of receivers. Private keys shrink as revoked users increase, and public key size is more reduced than other PKBE schemes. We extend our scheme to obtain chosen ciphertext security by using hash-based method.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings
Pages101-115
Number of pages15
DOIs
Publication statusPublished - 2008
Event4th Information Security Practice and Experience Conference, ISPEC 2008 - Sydney, NSW, Australia
Duration: 2008 Apr 212008 Apr 23

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4991 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th Information Security Practice and Experience Conference, ISPEC 2008
CountryAustralia
CitySydney, NSW
Period08/4/2108/4/23

Keywords

  • Full Collusion-Security
  • Public Key Broadcast Encryption

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme'. Together they form a unique fingerprint.

  • Cite this

    Park, J. H., & Lee, D. H. (2008). A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme. In Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings (pp. 101-115). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4991 LNCS). https://doi.org/10.1007/978-3-540-79104-1_8