Open Access   Article Go Back

Favorable Secure Broadcast Encryption with Static Cipher texts

P. Patidar1 , Iyapparaja M.2

  1. School of Information Technology and Engineering, VIT University, Vellore, India.
  2. School of Information Technology and Engineering, VIT University, Vellore, India.

Correspondence should be addressed to: iyapparaja.m@vit.ac.in.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-5 , Page no. 52-57, May-2017

Online published on May 30, 2017

Copyright © P. Patidar, Iyapparaja M. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Patidar, Iyapparaja M., “Favorable Secure Broadcast Encryption with Static Cipher texts,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.52-57, 2017.

MLA Style Citation: P. Patidar, Iyapparaja M. "Favorable Secure Broadcast Encryption with Static Cipher texts." International Journal of Computer Sciences and Engineering 5.5 (2017): 52-57.

APA Style Citation: P. Patidar, Iyapparaja M., (2017). Favorable Secure Broadcast Encryption with Static Cipher texts. International Journal of Computer Sciences and Engineering, 5(5), 52-57.

BibTex Style Citation:
@article{Patidar_2017,
author = {P. Patidar, Iyapparaja M.},
title = {Favorable Secure Broadcast Encryption with Static Cipher texts},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2017},
volume = {5},
Issue = {5},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {52-57},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1263},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1263
TI - Favorable Secure Broadcast Encryption with Static Cipher texts
T2 - International Journal of Computer Sciences and Engineering
AU - P. Patidar, Iyapparaja M.
PY - 2017
DA - 2017/05/30
PB - IJCSE, Indore, INDIA
SP - 52-57
IS - 5
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
799 629 downloads 552 downloads
  
  
           

Abstract

In!this research paper, we desire to blessing a fresh out of the impression new public key Broadcast encryption (BE) for accomplishing versatile security against supreme number of colluders. In particular, our subject is built from composite request multi direct maps and appreciates static message overhead of a proceeding with scope of bunch parts that square measure O(1) bits. In addition, the individual key size and open key size square measure all poly-logarithmic inside the total extent of customers. Thus, we tend to sum up the strategy of Lewko and Waters for acknowledging twin framework mystery keeping in touch with the Composite request multi direct groups, and after that demonstrate the versatile security of our subject underneath static suppositions inside the standard model. Contrasted and the best in class, our subject accomplishes the versatile security in clear and non-intelligent confirmable suppositions with the improved parameter estimate for BE (Broadcast Encryption) .

Key-Words / Index Term

Broadcast encryption, Adaptive security, Static sized cipher texts

References

[1] A. Fiat and M. Naor, “Broadcast encryption”, Advances in Cryptology—CRYPTO, Vol.3, Issue.8, pp. 480-491, 1994.
[2] D. Boneh, C. Gentry, and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys”, in Advances in Cryptology—CRYPTO, Vol. 2, Issue.10, pp. 258-275, 2005.
[3] T. Laarhoven, J. Doumen, P. Roelse, B. Škoric, B. Weger, “Dynamic Tardos traitor tracing schemes”, IEEE Trans. Inf. Theory, Vol. 59, Issue. 7, pp. 4230-4242, 2013.
[4] B. Chor, A. Fiat, M. Naor, B. Pinkas, “Tracing traitors”, IEEE Trans. Inf. Theory, Vol. 46, Issue. 3, pp. 893-910, 2000.
[5] D. Boneh, A. Silverberg, “Applications of multilinear forms tocryptography”, Contemp. Math., Vol. 324, Issue. 1, pp. 71-90, 2003.
[6] S. Park, K. Lee, D. H. Lee, “New constructions of revocable identity based encryption from multi linear maps”, IEEE Trans. Inf. Forensics Security, Vol. 10, Issue. 8, pp. 1564-1577, 2015.
[7] X. Du, Y. Wang, J. Ge, Y. Wang, “An ID-based broadcast encryption scheme for key distribution”, IEEE Trans. Broadcast., Vol. 51, Issue.2, pp. 264-266, 2005.
[8] J. Kim, W. Susilo, M. H. Au, J. Seberry, “Adaptively secure identitybased broadcast encryption with a constant-sized ciphertext”, IEEE Trans. Inf. Forensics Security, Vol. 10, Issue. 3, pp. 679-693, 2015.
[9] C. Gentry, A. Lewko, B. Waters, “Witness encryption from instance independent assumptions”, in Advances in Cryptology—CRYPTO, Vol.8, Issue.9, pp. 426-443, 2014.
[10] M. Naor and O. Reingold, “Number-theoretic constructions of efficientpseudo-random functions”, Journal of ACM, Vol.51, Issue.2, pp. 231-262, 2004.