Threshold identity-based broadcast encryption from identity-based encryption

Kitak Kim, Milyoung Kim, Hyoseung Kim, Jon Hwan Park, Dong Hoon Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    In threshold identity-based encryption, a sender encrypts a message under identities of a pool of users and assigns a threshold t to the ciphertext, and sends the resulting ciphertext to these users. The cooperation of at least t users among them is required to decrypt the given ciphertext. We propose a construction method for threshold identity-based broadcast encryption from any existing identity-based encryption.

    Original languageEnglish
    Title of host publicationComputer Applications for Database, Education, and Ubiquitous Computing - Int. Conferences, EL, DTA and UNESST 2012, Held as Part of the Future Generation Information Technol. Conf., FGIT 2012, Proc.
    Pages99-102
    Number of pages4
    DOIs
    Publication statusPublished - 2012
    Event2012 Conference on EL 2012, the 2012 Int. Conference on DTA 2012, and the 2012 International Conference on u- and e- Service, Science and Technology, UNESST 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012 - Gangneug, Korea, Republic of
    Duration: 2012 Dec 162012 Dec 19

    Publication series

    NameCommunications in Computer and Information Science
    Volume352 CCIS
    ISSN (Print)1865-0929

    Other

    Other2012 Conference on EL 2012, the 2012 Int. Conference on DTA 2012, and the 2012 International Conference on u- and e- Service, Science and Technology, UNESST 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012
    Country/TerritoryKorea, Republic of
    CityGangneug
    Period12/12/1612/12/19

    ASJC Scopus subject areas

    • General Computer Science
    • General Mathematics

    Fingerprint

    Dive into the research topics of 'Threshold identity-based broadcast encryption from identity-based encryption'. Together they form a unique fingerprint.

    Cite this