吉林大学学报(工学版) ›› 2010, Vol. 40 ›› Issue (01): 165-0170.

• paper • Previous Articles     Next Articles

Security of identity-based broadcast encryption

HU Liang1,LIU Zhe-li1,CHENG Xiao-chun2,SUN Tao1   

  1. 1.College of Computer Science and Technology, Jilin University, Changchun 130012, China;2.Department of Computer Communications, Middlesex University, London, NW4 4BE, England
  • Received:2009-02-16 Online:2010-01-01 Published:2010-01-01

Abstract:

Based on the analysis of the security notions for Identity-based Encryption (IBE) and Broadcast Encryption (BE), this paper proposes the security notions for identitybased broadcast encryption. First, two standard security notions for identitybased broadcast encryption are described, and the formal definition of their corresponding attack models is presented. Then the main securities are introduced and the transformation rules of these securities are summarized. Finally, two general ways for constructing identity-based encryption schemes are provided.

Key words: identity-based broadcast encryption, selective identity security, full security, static security, adaptive security, chosenciphertext security

CLC Number: 

  • TP393
[1] ZHAO Hong-wei, CHENG Yu, LI Zhuo, LI Yu-cui. Design of QoS architecture in IEEE802.16d [J]. 吉林大学学报(工学版), 2013, 43(03): 701-705.
[2] XIAN Shu, ZHENG Jin, LU Xing, ZHANG Shi-peng. Identification approach of P2P flow based on the content redistribution model [J]. 吉林大学学报(工学版), 2013, 43(03): 727-733.
[3] LIU Chun-xu, LIU Yuan-an, GAO Jin-chun, MA Xiao-lei. Clustering publish-subscribe routing protocol based on hierarchical architecture in MANET [J]. 吉林大学学报(工学版), 2013, 43(02): 451-458.
[4] GUAN Jian, LIU Yan-heng, LU Ying-qi, LIU Xue-jie, WANG Long, LIU Yang. Concentric ring cluster routing algorithm based on coverage for WSN [J]. 吉林大学学报(工学版), 2013, 43(01): 158-164.
[5] WEI Xiao-hui, ZOU Lei, LI Hong-liang. Virtual network embedding algorithm based on improved sub-graph isomorphism search [J]. 吉林大学学报(工学版), 2013, 43(01): 165-171.
[6] ZHANG Jun-wei, YANG Jing, ZHANG Jian-pei, ZHANG Le-jun. Sensitive association rule hiding based on sliding window [J]. 吉林大学学报(工学版), 2013, 43(01): 172-178.
[7] WANG Bo, YANG Jing, ZHANG Jian-pei. Entropy-based classification approach for personalized privacy anonymity [J]. 吉林大学学报(工学版), 2013, 43(01): 179-185.
[8] LI Xin, LI Jing-chun, LIN Ran, WANG Shao-jie, WANG Wen-jie, LIU Chi. Efficient prioritized congestion management for social network based live sharing [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 255-260.
[9] WANG Xiao-dong, CHEN Xiao, MIN Jie, YE Qing-wei, ZHOU Yu. Call admission control mechanism based on measurement-assisted and delay prediction for wireless sensor network [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 280-284.
[10] WANG Kun, YU Yue, ZHANG Yu-hua, GUO Huang, WANG Lin-lin. Packet sending algorithm based on bundle protocol in DTN networks [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 285-289.
[11] WANG Kun, YU Yue, ZHANG Yu-hua, GUO Huang, WANG Lin-lin. IOT platform-oriented Socket design and optimization [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 290-294.
[12] CHEN Long, LI Jun-zhong. Verifiable method for remote data integrity supporting different granular operation [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 295-299.
[13] HAN Yong, YAO Nian-min, CAI Shao-bin, HAN Qi-long. Congestion-aware iSCSI virtualization storage system [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 368-372.
[14] GUAN Jian, SUN Da-yang, WANG Ai-min, LIU Yan-heng. Static chain-cluster routing algorithm based on transmitting coordinate for wireless sensor network [J]. 吉林大学学报(工学版), 2012, 42(02): 412-417.
[15] SHEN Jie, YIN Gui-sheng, WANG Xiang-hui. XML data filtering in P2P network based on non-determinate finite automata [J]. 吉林大学学报(工学版), 2012, 42(01): 134-139.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!