An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
CNSR '04 Proceedings of the Second Annual Conference on Communication Networks and Services Research
Authenticated Broadcast Encryption Scheme
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01
Indentity-based broadcast signcryption
Computer Standards & Interfaces
Broadcast Encryption with Sender Authentication and its Duality
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
Authenticated Secure Group Communication using Broadcast Encryption Key Computation
ITNG '08 Proceedings of the Fifth International Conference on Information Technology: New Generations
PST '08 Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust
Identity-Based authenticated broadcast encryption and distributed authenticated encryption
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
Hi-index | 0.00 |
In applications like wireless content distribution, a central authority needs to deliver encrypted data to a large number of recipients in such a way that only a privileged subset of users can decrypt it. In addition, to avert junk content or spam, subscribers must have source authentication with respect to their broadcasters. The limited memory and computational power of mobile devices, coupled with escalating costs of wireless bandwidth make efficiency a major concern. Broadcast signcryption , which enables the broadcaster to simultaneously encrypt and sign the content meant for a specific set of users in a single logical step, provides the most efficient solution to this dual problem of confidentiality and authentication. It is arguably most efficiently implemented in the ID-based setting because of its well known advantages. Only three IBBSC schemes exist in literature, one of which has already been shown to be flawed and its security leaks fixed. In this paper, we show that the remaining two -- Mu et al.'s scheme and Li et al.'s scheme are also flawed. Specifically, we show that while Mu et al.'s scheme is insecure with respect to unforgeability, Li et al.'s scheme can be totally broken (with respect to both unforgeability and confidentiality). Following this, we propose a new IBBSC scheme and formally prove its security under the strongest existing security models for broadcast signcryption (IND-CCA2 and EUF-CMA).