Favorable Secure Broadcast Encryption with Static Cipher texts
P. Patidar1 , Iyapparaja M.2
- School of Information Technology and Engineering, VIT University, Vellore, India.
- School of Information Technology and Engineering, VIT University, Vellore, India.
Correspondence should be addressed to: iyapparaja.m@vit.ac.in.
Section:Research Paper, Product Type: Journal Paper
Volume-5 ,
Issue-5 , Page no. 52-57, May-2017
Online published on May 30, 2017
Copyright © P. Patidar, Iyapparaja M. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: P. Patidar, Iyapparaja M., “Favorable Secure Broadcast Encryption with Static Cipher texts,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.52-57, 2017.
MLA Citation
MLA Style Citation: P. Patidar, Iyapparaja M. "Favorable Secure Broadcast Encryption with Static Cipher texts." International Journal of Computer Sciences and Engineering 5.5 (2017): 52-57.
APA Citation
APA Style Citation: P. Patidar, Iyapparaja M., (2017). Favorable Secure Broadcast Encryption with Static Cipher texts. International Journal of Computer Sciences and Engineering, 5(5), 52-57.
BibTex Citation
BibTex Style Citation:
@article{Patidar_2017,
author = {P. Patidar, Iyapparaja M.},
title = {Favorable Secure Broadcast Encryption with Static Cipher texts},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2017},
volume = {5},
Issue = {5},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {52-57},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1263},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1263
TI - Favorable Secure Broadcast Encryption with Static Cipher texts
T2 - International Journal of Computer Sciences and Engineering
AU - P. Patidar, Iyapparaja M.
PY - 2017
DA - 2017/05/30
PB - IJCSE, Indore, INDIA
SP - 52-57
IS - 5
VL - 5
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
982 | 845 downloads | 715 downloads |




Abstract
In!this research paper, we desire to blessing a fresh out of the impression new public key Broadcast encryption (BE) for accomplishing versatile security against supreme number of colluders. In particular, our subject is built from composite request multi direct maps and appreciates static message overhead of a proceeding with scope of bunch parts that square measure O(1) bits. In addition, the individual key size and open key size square measure all poly-logarithmic inside the total extent of customers. Thus, we tend to sum up the strategy of Lewko and Waters for acknowledging twin framework mystery keeping in touch with the Composite request multi direct groups, and after that demonstrate the versatile security of our subject underneath static suppositions inside the standard model. Contrasted and the best in class, our subject accomplishes the versatile security in clear and non-intelligent confirmable suppositions with the improved parameter estimate for BE (Broadcast Encryption) .
Key-Words / Index Term
Broadcast encryption, Adaptive security, Static sized cipher texts
References
[1] A. Fiat and M. Naor, “Broadcast encryption”, Advances in Cryptology—CRYPTO, Vol.3, Issue.8, pp. 480-491, 1994.
[2] D. Boneh, C. Gentry, and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys”, in Advances in Cryptology—CRYPTO, Vol. 2, Issue.10, pp. 258-275, 2005.
[3] T. Laarhoven, J. Doumen, P. Roelse, B. Škoric, B. Weger, “Dynamic Tardos traitor tracing schemes”, IEEE Trans. Inf. Theory, Vol. 59, Issue. 7, pp. 4230-4242, 2013.
[4] B. Chor, A. Fiat, M. Naor, B. Pinkas, “Tracing traitors”, IEEE Trans. Inf. Theory, Vol. 46, Issue. 3, pp. 893-910, 2000.
[5] D. Boneh, A. Silverberg, “Applications of multilinear forms tocryptography”, Contemp. Math., Vol. 324, Issue. 1, pp. 71-90, 2003.
[6] S. Park, K. Lee, D. H. Lee, “New constructions of revocable identity based encryption from multi linear maps”, IEEE Trans. Inf. Forensics Security, Vol. 10, Issue. 8, pp. 1564-1577, 2015.
[7] X. Du, Y. Wang, J. Ge, Y. Wang, “An ID-based broadcast encryption scheme for key distribution”, IEEE Trans. Broadcast., Vol. 51, Issue.2, pp. 264-266, 2005.
[8] J. Kim, W. Susilo, M. H. Au, J. Seberry, “Adaptively secure identitybased broadcast encryption with a constant-sized ciphertext”, IEEE Trans. Inf. Forensics Security, Vol. 10, Issue. 3, pp. 679-693, 2015.
[9] C. Gentry, A. Lewko, B. Waters, “Witness encryption from instance independent assumptions”, in Advances in Cryptology—CRYPTO, Vol.8, Issue.9, pp. 426-443, 2014.
[10] M. Naor and O. Reingold, “Number-theoretic constructions of efficientpseudo-random functions”, Journal of ACM, Vol.51, Issue.2, pp. 231-262, 2004.