2008
DOI: 10.1007/978-3-540-89255-7_28
|View full text |Cite
|
Sign up to set email alerts
|

Generalized Identity Based and Broadcast Encryption Schemes

Abstract: Abstract. We provide a general framework for constructing identitybased and broadcast encryption systems. In particular, we construct a general encryption system called spatial encryption from which many systems with a variety of properties follow. The ciphertext size in all these systems is independent of the number of users involved and is just three group elements. Private key size grows with the complexity of the system. One application of these results gives the first broadcast HIBE system with short ciph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
187
0
2

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 162 publications
(189 citation statements)
references
References 17 publications
0
187
0
2
Order By: Relevance
“…The new protocol allows an adversary to adaptively choose his targets, and it offers the key secrecy, known-key security and partial forward secrecy properties. This design is also readily adaptable to provide broadcast encryption [7,15].…”
Section: Resultsmentioning
confidence: 99%
“…The new protocol allows an adversary to adaptively choose his targets, and it offers the key secrecy, known-key security and partial forward secrecy properties. This design is also readily adaptable to provide broadcast encryption [7,15].…”
Section: Resultsmentioning
confidence: 99%
“…the distribution R W IBE . However, as a future direction, it would be interesting to explore whether there exist HIBE schemes that are IND-sCR-CPA-secure according to the most generic notion, i.e., without any restriction on R. Perhaps more interestingly, the resulting primitive could be seen as the dual version of the notion of Spatial Encryption proposed by Boneh and Hamburg in [14]. In Spatial Encryption, ciphertexts are associated to points in Z p , while secret keys correspond to affine subspaces of Z p .…”
Section: Future Directionsmentioning
confidence: 99%
“…In a BE scheme [FN94,YFDL04,BGW05,BH08,PPS11,BWZ14] there is a set of n users, and for any given subset S ⊆ {1, . .…”
Section: Introductionmentioning
confidence: 99%