2018
DOI: 10.26599/tst.2018.9010023
|View full text |Cite
|
Sign up to set email alerts
|

Revocable hierarchical identity-based broadcast encryption

Abstract: Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of users while only intended users can decrypt. However, current HIBBE schemes do not support efficient revocation of private keys. Here, a new primitive called Revocable Hierarchical Identity-Based Broadcast Encryption (RHIBBE) is formalized that allows revocation of the HIBBE. Ciphertext indistinguisha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 33 publications
1
10
0
Order By: Relevance
“…We analyzed the functional differences between our scheme and the other six broadcast encryption schemes. From Table 2, the schemes in [10,12,15] are consistent with the schemes in this paper, all of which are identity-based broadcast encryption. Combined with the changes in user privileges in smart cities, the user revocation property is used to adjust authorization identities dynamically.…”
Section: Performance Evaluation 61 Comparison Of Functionssupporting
confidence: 71%
See 2 more Smart Citations
“…We analyzed the functional differences between our scheme and the other six broadcast encryption schemes. From Table 2, the schemes in [10,12,15] are consistent with the schemes in this paper, all of which are identity-based broadcast encryption. Combined with the changes in user privileges in smart cities, the user revocation property is used to adjust authorization identities dynamically.…”
Section: Performance Evaluation 61 Comparison Of Functionssupporting
confidence: 71%
“…To improve efficiency, Zhu et al [14] constructed a mechanism to support designation and revocation and introduced dual-modes. In [15], Li et al present a new broadcast encryption scheme for prime-order bilinear groups which achieves revocation. However, these works are not aimed at solving receiver anonymity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on CS method, we realize the revocation in this paper. The binary tree of CS method is described as the Figure 1 shows [43].…”
Section: Subset-cover Revocation Frameworkmentioning
confidence: 99%
“…Among the three types of MKFHE schemes, the NTRU-type MKFHE scheme is the fastest in encryption and decryption, and has the simplest form, and uses the least ciphertexts and keys. The underlying scheme of the NTRU encryption has been used to design various cryptographic primitives, including the digital signatures [15] , identity-based encryption [16,17] , and multilinear maps [18,19] .…”
Section: Introductionmentioning
confidence: 99%