JOURNAL ARTICLE

Hierarchical identity-based broadcast encryption scheme from LWE

Chunli YangShihui ZhengLicheng WangXiuhua LuYixian Yang

Year: 2014 Journal:   Journal of Communications and Networks Vol: 16 (3)Pages: 258-263   Publisher: Institute of Electrical and Electronics Engineers

Abstract

A hierarchical identity-based broadcast encryption (H-IBBE) scheme is an identity-based broadcast encryption (IBBE) scheme in a hierarchical environment. In order to obtain secure H-IBBE schemes in the quantum era, we propose an H-IBBE scheme based on the learning with errors problem assumption. Our scheme achieves indistinguishability from random under adaptive chosen-plaintext and chosen-identity attacks in the random oracle model.

Keywords:
Random oracle Computer science Broadcast encryption Encryption Scheme (mathematics) Probabilistic encryption Identity (music) Plaintext Theoretical computer science Deterministic encryption Cryptography Computer network Algorithm Public-key cryptography Mathematics

Metrics

7
Cited By
1.45
FWCI (Field Weighted Citation Impact)
26
Refs
0.85
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

BOOK-CHAPTER

Hierarchical Identity-Based Broadcast Encryption

Weiran LiuJianwei LiuQianhong WuBo Qin

Lecture notes in computer science Year: 2014 Pages: 242-257
JOURNAL ARTICLE

Revocable hierarchical identity-based broadcast encryption

Dawei LiJianwei LiuZongyang ZhangQianhong WuWeiran Liu

Journal:   Tsinghua Science & Technology Year: 2018 Vol: 23 (5)Pages: 539-549
JOURNAL ARTICLE

Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model

Yongli TangMing‐Ming WangQing YePanke QinZongqu Zhao

Journal:   The Journal of China Universities of Posts and Telecommunications Year: 2019 Vol: 26 (4)
BOOK-CHAPTER

Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption

Kitak KimMilyoung KimHyoseung KimJon Hwan ParkDong Hoon Lee

Communications in computer and information science Year: 2012 Pages: 99-102
© 2026 ScienceGate Book Chapters — All rights reserved.