Abstract
In the context of an unsecure transmission channel, identity-based cryptography makes it possible to implement broadcast data transfer for a large number of recipients much more effective than classical public-key cryptography. A comparative analysis of such schemes is carried out and recommendations on selecting a particular scheme based on the system requirements (whether it is a public or private system, how often and how the group of recipients and security level changes, etc.) are provided.
Similar content being viewed by others
References
Mu, Y., Susilo, W., and Lin, Y.-X., Identity-based broadcasting, INDOCRYPT 2003, Johansson and Maitra, S., Eds., 2003, vol. 2904, pp. 177–190.
Boneh, D., Gentry, C., and Waters, B., Collusion resistant broadcast encryption with short ciphertexts and private keys, CRYPTO, 2005, vol. 3621, pp. 258–275.
Yang, Ch., Cheng, X., Ma, W., and Wang, X., A new ID-based broadcast encryption scheme, ATC 2006, 2006, vol. 4158, pp. 487–492.
Delerablee, C., Identity-based broadcast encryption with constant size ciphertexts and private keys, ASIACRYPT 2007, 2007, vol. 4833, pp. 200–215.
Park, J.H. and Lee, D.H., A new public key broadcast encryption using Boneh-Boyen-Goh’s HIBE scheme, ISPEC 2008, 2008, vol. 4991, pp. 101–115.
Zhang, L., Hu, Y., and Wu, Q., Identity-based threshold broadcast encryption in the standard model, KSII Trans. Int. Inf. Syst., 2010, vol. 4, no. 3, pp. 400–410.
Zhang, L., Wu, Q., and Hu, Y., New constructions of identity-based broadcast encryption without random oracles, KSII Trans. Int. Inf. Syst., 2011, vol. 5, no. 2, pp. 428–439.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © A.N. Kulakov, E.B. Aleksandrova, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Kulakov, A.N., Aleksandrova, E.B. Analysis of broadcast schemes that implement identity-based encryption algorithms. Aut. Control Comp. Sci. 49, 790–797 (2015). https://doi.org/10.3103/S014641161508009X
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S014641161508009X