Threshold identity-based broadcast encryption from identity-based encryption

Kitak Kim, Milyoung Kim, Hyoseung Kim, Jon Hwan Park, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In threshold identity-based encryption, a sender encrypts a message under identities of a pool of users and assigns a threshold t to the ciphertext, and sends the resulting ciphertext to these users. The cooperation of at least t users among them is required to decrypt the given ciphertext. We propose a construction method for threshold identity-based broadcast encryption from any existing identity-based encryption.

Original languageEnglish
Title of host publicationCommunications in Computer and Information Science
Pages99-102
Number of pages4
Volume352 CCIS
DOIs
Publication statusPublished - 2012 Dec 17
Event2012 Conference on EL 2012, the 2012 Int. Conference on DTA 2012, and the 2012 International Conference on u- and e- Service, Science and Technology, UNESST 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012 - Gangneug, Korea, Republic of
Duration: 2012 Dec 162012 Dec 19

Publication series

NameCommunications in Computer and Information Science
Volume352 CCIS
ISSN (Print)18650929

Other

Other2012 Conference on EL 2012, the 2012 Int. Conference on DTA 2012, and the 2012 International Conference on u- and e- Service, Science and Technology, UNESST 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012
CountryKorea, Republic of
CityGangneug
Period12/12/1612/12/19

Fingerprint

Cryptography

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Kim, K., Kim, M., Kim, H., Park, J. H., & Lee, D. H. (2012). Threshold identity-based broadcast encryption from identity-based encryption. In Communications in Computer and Information Science (Vol. 352 CCIS, pp. 99-102). (Communications in Computer and Information Science; Vol. 352 CCIS). https://doi.org/10.1007/978-3-642-35603-2_14

Threshold identity-based broadcast encryption from identity-based encryption. / Kim, Kitak; Kim, Milyoung; Kim, Hyoseung; Park, Jon Hwan; Lee, Dong Hoon.

Communications in Computer and Information Science. Vol. 352 CCIS 2012. p. 99-102 (Communications in Computer and Information Science; Vol. 352 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, K, Kim, M, Kim, H, Park, JH & Lee, DH 2012, Threshold identity-based broadcast encryption from identity-based encryption. in Communications in Computer and Information Science. vol. 352 CCIS, Communications in Computer and Information Science, vol. 352 CCIS, pp. 99-102, 2012 Conference on EL 2012, the 2012 Int. Conference on DTA 2012, and the 2012 International Conference on u- and e- Service, Science and Technology, UNESST 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, Republic of, 12/12/16. https://doi.org/10.1007/978-3-642-35603-2_14
Kim K, Kim M, Kim H, Park JH, Lee DH. Threshold identity-based broadcast encryption from identity-based encryption. In Communications in Computer and Information Science. Vol. 352 CCIS. 2012. p. 99-102. (Communications in Computer and Information Science). https://doi.org/10.1007/978-3-642-35603-2_14
Kim, Kitak ; Kim, Milyoung ; Kim, Hyoseung ; Park, Jon Hwan ; Lee, Dong Hoon. / Threshold identity-based broadcast encryption from identity-based encryption. Communications in Computer and Information Science. Vol. 352 CCIS 2012. pp. 99-102 (Communications in Computer and Information Science).
@inproceedings{d26e7ee88d6345fa93cb0a1f96c67a8d,
title = "Threshold identity-based broadcast encryption from identity-based encryption",
abstract = "In threshold identity-based encryption, a sender encrypts a message under identities of a pool of users and assigns a threshold t to the ciphertext, and sends the resulting ciphertext to these users. The cooperation of at least t users among them is required to decrypt the given ciphertext. We propose a construction method for threshold identity-based broadcast encryption from any existing identity-based encryption.",
author = "Kitak Kim and Milyoung Kim and Hyoseung Kim and Park, {Jon Hwan} and Lee, {Dong Hoon}",
year = "2012",
month = "12",
day = "17",
doi = "10.1007/978-3-642-35603-2_14",
language = "English",
isbn = "9783642356025",
volume = "352 CCIS",
series = "Communications in Computer and Information Science",
pages = "99--102",
booktitle = "Communications in Computer and Information Science",

}

TY - GEN

T1 - Threshold identity-based broadcast encryption from identity-based encryption

AU - Kim, Kitak

AU - Kim, Milyoung

AU - Kim, Hyoseung

AU - Park, Jon Hwan

AU - Lee, Dong Hoon

PY - 2012/12/17

Y1 - 2012/12/17

N2 - In threshold identity-based encryption, a sender encrypts a message under identities of a pool of users and assigns a threshold t to the ciphertext, and sends the resulting ciphertext to these users. The cooperation of at least t users among them is required to decrypt the given ciphertext. We propose a construction method for threshold identity-based broadcast encryption from any existing identity-based encryption.

AB - In threshold identity-based encryption, a sender encrypts a message under identities of a pool of users and assigns a threshold t to the ciphertext, and sends the resulting ciphertext to these users. The cooperation of at least t users among them is required to decrypt the given ciphertext. We propose a construction method for threshold identity-based broadcast encryption from any existing identity-based encryption.

UR - http://www.scopus.com/inward/record.url?scp=84870863397&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84870863397&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-35603-2_14

DO - 10.1007/978-3-642-35603-2_14

M3 - Conference contribution

SN - 9783642356025

VL - 352 CCIS

T3 - Communications in Computer and Information Science

SP - 99

EP - 102

BT - Communications in Computer and Information Science

ER -