Skip to main content
Log in

Analysis of broadcast schemes that implement identity-based encryption algorithms

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

In the context of an unsecure transmission channel, identity-based cryptography makes it possible to implement broadcast data transfer for a large number of recipients much more effective than classical public-key cryptography. A comparative analysis of such schemes is carried out and recommendations on selecting a particular scheme based on the system requirements (whether it is a public or private system, how often and how the group of recipients and security level changes, etc.) are provided.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mu, Y., Susilo, W., and Lin, Y.-X., Identity-based broadcasting, INDOCRYPT 2003, Johansson and Maitra, S., Eds., 2003, vol. 2904, pp. 177–190.

    Article  MathSciNet  Google Scholar 

  2. Boneh, D., Gentry, C., and Waters, B., Collusion resistant broadcast encryption with short ciphertexts and private keys, CRYPTO, 2005, vol. 3621, pp. 258–275.

    MathSciNet  Google Scholar 

  3. Yang, Ch., Cheng, X., Ma, W., and Wang, X., A new ID-based broadcast encryption scheme, ATC 2006, 2006, vol. 4158, pp. 487–492.

    Google Scholar 

  4. Delerablee, C., Identity-based broadcast encryption with constant size ciphertexts and private keys, ASIACRYPT 2007, 2007, vol. 4833, pp. 200–215.

    Article  MathSciNet  Google Scholar 

  5. Park, J.H. and Lee, D.H., A new public key broadcast encryption using Boneh-Boyen-Goh’s HIBE scheme, ISPEC 2008, 2008, vol. 4991, pp. 101–115.

    Google Scholar 

  6. Zhang, L., Hu, Y., and Wu, Q., Identity-based threshold broadcast encryption in the standard model, KSII Trans. Int. Inf. Syst., 2010, vol. 4, no. 3, pp. 400–410.

    Google Scholar 

  7. Zhang, L., Wu, Q., and Hu, Y., New constructions of identity-based broadcast encryption without random oracles, KSII Trans. Int. Inf. Syst., 2011, vol. 5, no. 2, pp. 428–439.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. N. Kulakov.

Additional information

Original Russian Text © A.N. Kulakov, E.B. Aleksandrova, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kulakov, A.N., Aleksandrova, E.B. Analysis of broadcast schemes that implement identity-based encryption algorithms. Aut. Control Comp. Sci. 49, 790–797 (2015). https://doi.org/10.3103/S014641161508009X

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S014641161508009X

Keywords