Identity-Based Broadcasting

In this paper, we introduce a new concept called “Identity-Based Broadcasting Encryption” (IBBE), which can be applied to dynamic key management in secure broadcasting. Based on this new concept, in the proposed system a broadcaster can dynamically add or remove a user to or from the receiver group without any involvement of users. We classify our systems into three different scenarios and give three provably secure and elegant constructions of IBBE system based on the pairing. Our system naturally suits multi-group broadcasting, where a message can be selectively broadcasted to certain groups of users.

[1]  Amos Fiat,et al.  Broadcast Encryption , 1993, CRYPTO.

[2]  Yuliang Zheng,et al.  Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.

[3]  Kwangjo Kim,et al.  ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.

[4]  Craig Gentry,et al.  Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.

[5]  Douglas R. Stinson,et al.  Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.

[6]  Walter M. Lioen,et al.  Factorization of RSA-140 Using the Number Field Sieve , 1999, CRYPTO 1999.

[7]  Antoine Joux,et al.  A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.

[8]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[9]  Aggelos Kiayias,et al.  Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.

[10]  C. Pandu Rangan,et al.  Progress in Cryptology — INDOCRYPT 2001 , 2001, Lecture Notes in Computer Science.

[11]  Francesco Pappalardi,et al.  Review of the book "Elliptic Curves in Cryptography" by I. Blake, G. Seroussi, N. Smart. , 2001 .

[12]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[13]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[14]  Jeffrey Shallit,et al.  Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.

[15]  Tsutomu Matsumoto,et al.  A Quick Group Key Distribution Scheme with "Entity Revocation" , 1999, ASIACRYPT.

[16]  Eric R. Verheul,et al.  Self-Blindable Credential Certificates from the Weil Pairing , 2001, ASIACRYPT.

[17]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[18]  Colin Boyd,et al.  Advances in Cryptology - ASIACRYPT 2001 , 2001 .

[19]  Yi Mu,et al.  Robust and Secure Broadcasting , 2001, INDOCRYPT.

[20]  Alfred Menezes,et al.  Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.