|
|
Fully Secure Anonymous Identity-Based Broadcast Encryption Scheme |
SUN Jin1,2,HU Yupu2 |
(1. Department of Application Mathematics, Xi’an University of Technology, Xi’an 710048, China; 2. Key Lab of Computer Network and Information Security, Xidian University, Xi’an 710071, China) |
|
|
Abstract A fully secure anonymous identity-based broadcast encryption scheme was proposed by combining the Waters dual system encryption with the orthogonality property of composite-order bilinear groups. Based on the standard model without tags, the scheme can achieve constant-size key and ciphertext which constrain three group exponents, respectively. The scheme is proved by using the three static assumptions which do not depend on the number of queries the attacker makes. Furthermore, the analysis results indicate that the scheme proposed in this paper is fully secure and can satisfy the higher efficiency and practice requirement.
|
Received: 03 September 2012
Published: 30 July 2013
|
|
|
|
|
[1] |
SUN Wenlong1,GUAN Jie1. Algebraic Attacks on Trivium-Like Stream Ciphers[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2014, 48(10): 1434-1439. |
[2] |
ZHANG Zhongya1,2,GUAN Jie1. Differential Analysis of Stream Cipher Phelix[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(07): 1131-1136. |
[3] |
ZHANG Zhong-Ya, GUAN Jie. Differential Fault Analysis on the Stream Cipher LEX[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(06): 865-869. |
[4] |
GUAN Jie, DING Lin. Slide Attack on Modified Trivium Stream Cipher[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(06): 926-930. |
|
|
|
|