2005
DOI: 10.1049/ip-com:20045308
|View full text |Cite
|
Sign up to set email alerts
|

Efficient identity-based multicast scheme from bilinear pairing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(15 citation statements)
references
References 5 publications
0
15
0
Order By: Relevance
“…Considering a situation where Boneh and Franklin's IBE scheme [14,15] is used for multiple receivers, when a sender would like to encrypt a message for t receivers, the sender must encrypt the message t times using Boneh and Franklin's IBE scheme. Afterward, many IBBE [25][26][27][28][29][30] and MIBE [31][32][33] have been proposed to improve the performance problem of encryption for multiple receivers. Afterward, many IBBE [25][26][27][28][29][30] and MIBE [31][32][33] have been proposed to improve the performance problem of encryption for multiple receivers.…”
Section: Related Workmentioning
confidence: 99%
“…Considering a situation where Boneh and Franklin's IBE scheme [14,15] is used for multiple receivers, when a sender would like to encrypt a message for t receivers, the sender must encrypt the message t times using Boneh and Franklin's IBE scheme. Afterward, many IBBE [25][26][27][28][29][30] and MIBE [31][32][33] have been proposed to improve the performance problem of encryption for multiple receivers. Afterward, many IBBE [25][26][27][28][29][30] and MIBE [31][32][33] have been proposed to improve the performance problem of encryption for multiple receivers.…”
Section: Related Workmentioning
confidence: 99%
“…1. As is shown, the proposed scheme requires the least communication overhead in contrast to the other pairing-based schemes [6,8] which require the communication cost in proportion to the number of group members or multicast data size; or the other subset-cover-based schemes CS, SD [3] which require the communication cost in proportion to the number of revoked group members.…”
Section: Performance Analysismentioning
confidence: 91%
“…As the ciphertext is a MAC of the message, any group members can forge the messages sent from a group controller pretending they are from the group controller. Lin et al [7] also found that [6] is not secure against the insider forgery attack.…”
Section: Related Workmentioning
confidence: 95%
See 2 more Smart Citations