2013
DOI: 10.1007/978-3-642-36334-4_12
|View full text |Cite
|
Sign up to set email alerts
|

Improved Broadcast Encryption Scheme with Constant-Size Ciphertext

Abstract: Abstract. The Boneh-Gentry-Waters (BGW) [4] scheme is one of the most efficient broadcast encryption scheme regarding the overhead size. This performance relies on the use of a pairing. Hence this protocol can benefit from public key improvements. The ciphertext is of constant size, whatever the proportion of revoked users is. The main lasting constraint is the computation time at receiver end as it depends on the number of revoked users. In this paper we describe two modifications to improve the BGW bandwidth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…the list of revoked or authorized users and the message) plus an overhead whose size is constant (in practice it consists of two points on elliptic curves). A practical implementation is described in [DGB12]. The main weakness of such schemes is that they rely on number-theoretic problems that can be solved in polynomial time using quantum computers.…”
Section: State Of the Art On Broadcast Encryptionmentioning
confidence: 99%
“…the list of revoked or authorized users and the message) plus an overhead whose size is constant (in practice it consists of two points on elliptic curves). A practical implementation is described in [DGB12]. The main weakness of such schemes is that they rely on number-theoretic problems that can be solved in polynomial time using quantum computers.…”
Section: State Of the Art On Broadcast Encryptionmentioning
confidence: 99%
“…We prove that the q-SMEBDH is weaker than the well-known q bilinear Diffie-Hellman exponent assumption (q-BDHE). The (decisional) q-BDHE problem is stated as follows [5,20,35,36]: given a vector of elements,…”
Section: Computational Complexity Assumptionsmentioning
confidence: 99%
“…There are two kinds of broadcast encryption, the symmetric key based [1][2][3][4][5] and the public key based [6][7][8][9]. In a symmetric key based broadcast encryption system, only the trusted authority that generates all private keys can act as the broadcaster; ordinary users can only receive and decrypt messages, but cannot send messages.…”
Section: Introductionmentioning
confidence: 99%