Efficient identity-based broadcast signcryption schemes

ABSTRACTMost of broadcast encryption schemes do not provide source authentication property. This allows an adversary to launch impersonating attacks. Therefore, broadcast encryption scheme without source authentication is not applicable in our real life as it is. In this paper, we propose two source...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2014-05, Vol.7 (5), p.914-925
Hauptverfasser: Kim, Intae, Hwang, Seong Oun
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:ABSTRACTMost of broadcast encryption schemes do not provide source authentication property. This allows an adversary to launch impersonating attacks. Therefore, broadcast encryption scheme without source authentication is not applicable in our real life as it is. In this paper, we propose two source‐authenticated broadcast encryption schemes that achieve both confidentiality and authenticity simultaneously. Ciphertexts in both schemes are of constant size, independent of the size of the receiver set. The first scheme is particularly efficient in case of pre‐computation, whereas the overall performance of the second scheme is better than that of Selvi et al.'s scheme. Copyright © 2013 John Wiley & Sons, Ltd. In this paper, we propose two source‐authenticated broadcast encryption schemes that achieve both confidentiality and authenticity simultaneously. Ciphertexts in both schemes are of constant size, independent of the size of the receiver set. The first scheme is particularly efficient in case of pre‐computation, whereas the overall performance of the second scheme is better.
ISSN:1939-0114
1939-0122
DOI:10.1002/sec.802