Privacy-preserving identity-based broadcast encryption

Cited 42 time in webofscience Cited 0 time in scopus
  • Hit : 390
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorHur, Junbeomko
dc.contributor.authorPark, Chanilko
dc.contributor.authorHwang, Seong Ounko
dc.date.accessioned2013-03-12T17:02:52Z-
dc.date.available2013-03-12T17:02:52Z-
dc.date.created2012-10-09-
dc.date.created2012-10-09-
dc.date.issued2012-10-
dc.identifier.citationINFORMATION FUSION, v.13, no.4, pp.296 - 303-
dc.identifier.issn1566-2535-
dc.identifier.urihttp://hdl.handle.net/10203/102944-
dc.description.abstractBroadcast encryption enables a broadcaster to encrypt messages and transmit them to some subset S of authorized users. In identity-based broadcast encryption schemes, a broadcasting sender typically encrypts a message by combining public identities of receivers in S and system parameters. However, previous identity-based broadcast encryption schemes have not been concerned about preserving the privacy of receivers. Consequently, all of the identities of broadcast receivers in Sate exposed to the public in the previous schemes, which may be subject to attacks on user privacy in lots of pragmatic applications. We propose a novel privacy-preserving identity-based broadcast encryption scheme against an active attacker. The proposed scheme protects the privacy of receivers of broadcasted messages by hiding the identities of receivers in S. Additionally, it achieves less storage and computation costs required to encrypt and decrypt the broadcast message, compared to the previous identity-based broadcast encryption schemes that do not provide user privacy. (C) 2011 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE BV-
dc.subjectKEY ENCAPSULATION-
dc.subjectRANDOM ORACLES-
dc.subjectCIPHERTEXTS-
dc.subjectMANAGEMENT-
dc.titlePrivacy-preserving identity-based broadcast encryption-
dc.typeArticle-
dc.identifier.wosid000305668300008-
dc.identifier.scopusid2-s2.0-84861593834-
dc.type.rimsART-
dc.citation.volume13-
dc.citation.issue4-
dc.citation.beginningpage296-
dc.citation.endingpage303-
dc.citation.publicationnameINFORMATION FUSION-
dc.identifier.doi10.1016/j.inffus.2011.03.003-
dc.contributor.nonIdAuthorHur, Junbeom-
dc.contributor.nonIdAuthorHwang, Seong Oun-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorBroadcast encryption-
dc.subject.keywordAuthorIdentity-based encryption-
dc.subject.keywordAuthorHidden receiver-
dc.subject.keywordPlusKEY ENCAPSULATION-
dc.subject.keywordPlusRANDOM ORACLES-
dc.subject.keywordPlusCIPHERTEXTS-
dc.subject.keywordPlusMANAGEMENT-
Appears in Collection
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 42 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0