Threshold identity-based broadcast encryption from identity-based encryption

Kitak Kim, Milyoung Kim, Hyoseung Kim, Jon Hwan Park, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In threshold identity-based encryption, a sender encrypts a message under identities of a pool of users and assigns a threshold t to the ciphertext, and sends the resulting ciphertext to these users. The cooperation of at least t users among them is required to decrypt the given ciphertext. We propose a construction method for threshold identity-based broadcast encryption from any existing identity-based encryption.

Original languageEnglish
Title of host publicationComputer Applications for Database, Education, and Ubiquitous Computing - Int. Conferences, EL, DTA and UNESST 2012, Held as Part of the Future Generation Information Technol. Conf., FGIT 2012, Proc.
Pages99-102
Number of pages4
DOIs
Publication statusPublished - 2012
Event2012 Conference on EL 2012, the 2012 Int. Conference on DTA 2012, and the 2012 International Conference on u- and e- Service, Science and Technology, UNESST 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012 - Gangneug, Korea, Republic of
Duration: 2012 Dec 162012 Dec 19

Publication series

NameCommunications in Computer and Information Science
Volume352 CCIS
ISSN (Print)1865-0929

Other

Other2012 Conference on EL 2012, the 2012 Int. Conference on DTA 2012, and the 2012 International Conference on u- and e- Service, Science and Technology, UNESST 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012
Country/TerritoryKorea, Republic of
CityGangneug
Period12/12/1612/12/19

ASJC Scopus subject areas

  • General Computer Science
  • General Mathematics

Fingerprint

Dive into the research topics of 'Threshold identity-based broadcast encryption from identity-based encryption'. Together they form a unique fingerprint.

Cite this