2010
DOI: 10.1007/978-3-642-16280-0_15
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Broadcast Encryption with Personalized Messages

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
10
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…In BE schemes, a broadcaster sends a common message m$$ m $$ encrypted by a session key K$$ K $$ to a set of users in S$$ S $$, and users outside S$$ S $$ have no access to correctly decrypt the ciphertext for obtaining K$$ K $$. Ohtake et al 14 introduced the concept of BE with personalized messages (BEPM). It is different from BE that broadcaster can send both common message and personalized messages to target users, which is audit friendly.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…In BE schemes, a broadcaster sends a common message m$$ m $$ encrypted by a session key K$$ K $$ to a set of users in S$$ S $$, and users outside S$$ S $$ have no access to correctly decrypt the ciphertext for obtaining K$$ K $$. Ohtake et al 14 introduced the concept of BE with personalized messages (BEPM). It is different from BE that broadcaster can send both common message and personalized messages to target users, which is audit friendly.…”
Section: Introductionmentioning
confidence: 99%
“…We have noticed that prior works of BEPM do not consider the issue of anonymity except schemes in References 15 and 16. It is inconvenient in practice to apply current BEs with personalized messages such as those in References 14,16‐20 for the reason that the target user has to know who else is able to correctly decrypt the ciphertext, which also leads to a severe privacy leakage of target receiver in the blockchain. Schemes in References 15 and 16 only achieve outsider anonymity that is weaker than full anonymity for the reason that information of receiver's identities are exposed to all target receivers in outsider anonymous BEPM scheme.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations