2015
DOI: 10.1007/s10207-015-0287-8
|View full text |Cite
|
Sign up to set email alerts
|

Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption

Abstract: We focus on practical Hierarchical IdentityBased Broadcast Encryption (HIBBE) with semantic security against adaptively chosen-ciphertext attacks (CCA2) in the standard model. We achieve this goal in two steps. First, we propose a new HIBBE scheme that is secure against chosenplaintext attacks (CPA). Compared with the existing HIBBE scheme that is built from composite-order bilinear groups, our construction is based on prime-order bilinear groups. The much better efficiency of group operations in prime-order b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 37 publications
0
6
0
Order By: Relevance
“…However, the scheme is constructed on composite bilinear group. To improve the efficiency of HIBBE, Liu et al [21] presented a practical chosenciphertext secure HIBBE scheme. Since then, several subsequent works focused on improving efficiency or security of HIBBE [22][23][24][25] .…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the scheme is constructed on composite bilinear group. To improve the efficiency of HIBBE, Liu et al [21] presented a practical chosenciphertext secure HIBBE scheme. Since then, several subsequent works focused on improving efficiency or security of HIBBE [22][23][24][25] .…”
Section: Related Workmentioning
confidence: 99%
“…The .t; ; n/-decisional n-wBDHI assumption holds in G if there is no algorithm that has advantage of at least in solving the decisional n-wBDHI problem in polynomial time t [21] .…”
Section: Decisional N-wbdhi Assumptionmentioning
confidence: 99%
“…The simulator B randomly picks σ ∈ {0, 1}, and simulates the Encrypt algorithm to acquire C R * and the ciphertext of m σ as follows: with the known G t , the ciphertext C R * = (C 0 , C 1 ) can be computed as Eq. (9).…”
Section: Security Analysis Of Rbbementioning
confidence: 99%
“…They proposed an adaptive Chosen-ciphertext attacks (CCA) secure scheme based on standard assumptions, which has ciphertexts that are shorter than those of the previous CCA secure schemes. Besides these above-mentioned schemes, there are some other researches about designation mechanism over BE on efficiency [6,7] and security [8,9] .…”
Section: Introductionmentioning
confidence: 99%
“… Hierarchical broadcast encryption: this variant of BE is constructed on pairing based cryptographic primitive that enables key delegation property to subsequent descendants in the hierarchical system. This was first proposed by [ 20 ] for identity-based BE scheme. The later scheme is IND-CCA secure with constant ciphertext size in standard model.…”
Section: Introductionmentioning
confidence: 99%