2012
DOI: 10.1016/j.jss.2011.09.045
|View full text |Cite
|
Sign up to set email alerts
|

Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Before providing the proposed generic construction, we will briefly review the definition of IBBE and PEKS first.…”
Section: Generic Constructionmentioning
confidence: 99%
“…Before providing the proposed generic construction, we will briefly review the definition of IBBE and PEKS first.…”
Section: Generic Constructionmentioning
confidence: 99%
“…primitive and is a technology that can deliver the same message to multiple recipients with single encryption. MRE has been conducted in various studies based on the form of designating multiple recipients using their public keys by taking advantage of IBC, as shown in Figures 3 and 4 [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22]. However, in the MRE method, an issue of identifying the recipient has been raised.…”
Section: Multireceiver Encryption Mre Is a Cryptographicmentioning
confidence: 99%
“…As defined above, N represents the maximum size of set for intended receivers, while n represents the size of current set for intended receivers, ≤ n N . The PKBE/IBBE schemes in [26,[28][29][30]35] adopted prime order bilinear groups. For prime order bilinear groups, P 1 denotes bilinear pairing operation, E 1 and M 1 respectively denote exponentiation and multiplication operation in  , while E 2 and M 2 respectively denote exponentiation and multiplication operation in T  .…”
Section: Conversion From Cpa To Cca2mentioning
confidence: 99%
“…Otherwise, the competitors may take advantage of these revealed identities for precision advertising or attracting customers. However, in general PKBE/IBBE schemes [26][27][28][29][30][31], the set of intended receivers' identities is usually deemed as a default part when outputting broadcast ciphertext. Then in the decryption phase, each user should first examine whether he/she is authorized to decrypt according to the target receiver set.…”
Section: Introductionmentioning
confidence: 99%