Fully CCA2 secure identity based broadcast encryption without random oracles
References (17)
- et al.
Broadcast encryption
Identity-based cryptosystems and signature schemes
Efficient identity-based encryption without random oracles
An identity based encryption scheme based on quadratic residues
Identity-based broadcast encryption with constant size ciphertext and private keys
- et al.
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
Practical identity-based encryption without random oracles
- et al.
Collusion resistant broadcast encryption with short ciphertexts and private keys
Cited by (51)
Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
2020, Information SciencesCitation Excerpt :Subsequently, in challenge phase, the adversary selects any proper subset of the target receiver set as challenging receiver set. Most of the existing PKBE schemes [3,6,8,9,14,15,17,35–37,47–49] are constructed with the form of identity-based broadcast encryption (IBBE) [32], which is a natural extension for the notion of identity-based encryption (IBE). IBBE could be viewed as a specific type for PKBE which combines BE and IBE.
Long-term secure management of large scale Internet of Things applications
2019, Journal of Network and Computer ApplicationsCitation Excerpt :Boneh et al. and Delerablée et al.‘s efforts (Boneh et al., 2005b; Delerablée et al., 2007) paved the way for more advanced short ciphertext schemes with trade off capability among encryption, decryption, ciphertext size, and public/private key sizes. Thus, our proposed scheme is based on prior parameter trade off capabilities and IBBE schemes (Boneh et al., 2005b; Delerablée et al., 2007; Delerablée, 2007; Ren and Gu, 2009). A computationally efficient bilinear map e from G1 × G2 to GT is e: G1 × G2 → GT.
Anonymous certificate-based broadcast encryption with constant decryption cost
2018, Information SciencesCitation Excerpt :Ren and Gu [38] alleged that they constructed the first adaptively CCA-secure IBBE scheme in the standard model. Nevertheless, Wang et al. [42] showed that the scheme [38] was not secure against CPA security. The IBBE schemes proposed in [49] were proved to achieve adaptive CCA and CPA security under q-type assumptions, respectively.
Anonymous Identity Based Broadcast Encryption against Continual Side Channel Attacks in the State Partition Model
2022, Applied Sciences (Switzerland)Toward Data Transmission Security Based on Proxy Broadcast Re-encryption in Edge Collaboration
2022, ACM Transactions on Sensor Networks