Identity-Based authenticated broadcast encryption and distributed authenticated encryption

  • Authors:
  • Yi Mu;Willy Susilo;Yan-Xia Lin;Chun Ruan

  • Affiliations:
  • School of IT and Computer Science;School of IT and Computer Science;School of Mathematics and Applied Statistics, University of Wollongong, Wollongong, Australia;School of Computing and IT, University of Western Sydney, South Penrith DC, Australia

  • Venue:
  • ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
  • Year:
  • 2004

Quantified Score

Hi-index 0.01

Visualization

Abstract

Since its introduction, broadcast encryption has attracted many useful applications. In this paper, we propose two identity-based schemes for authenticated broadcasting and distributed message authentication. The first scheme supports multiple broadcasters and allows each broadcaster to dynamically broadcast messages into an arbitrary group of receivers determined by the broadcaster. The receivers can obtain the broadcasted message using the identity of the broadcaster and his own secret decryption key; hence it ensures both confidentiality and authenticity of the message. The second scheme allows users (receivers) to send messages back to the broadcaster where the authentication of messages is done with the identity of the user. We also provide security proofs for our schemes under the random oracle model.