Low Overhead Broadcast Encryption from Multilinear Maps

@article{Boneh2014LowOB,
  title={Low Overhead Broadcast Encryption from Multilinear Maps},
  author={Dan Boneh and Brent Waters and Mark Zhandry},
  journal={IACR Cryptology ePrint Archive},
  year={2014},
  volume={2014},
  pages={195}
}
We use multilinear maps to provide a solution to the long-standing problem of public-key broadcast encryption where all parameters in the system are small. In our constructions, ciphertext overhead, private key size, and public key size are all poly-logarithmic in the total number of users. The systems are fully collusion-resistant against any number of colluders. All our systems are based on an O(logN)-way multilinear map to support a broadcast system for N users. We present three… CONTINUE READING

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 58 CITATIONS, ESTIMATED 90% COVERAGE

A Primer on Cryptographic Multilinear Maps and Code Obfuscation

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

New Constructions of Revocable Identity-Based Encryption From Multilinear Maps

  • IEEE Transactions on Information Forensics and Security
  • 2013
VIEW 9 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation

  • IACR Cryptology ePrint Archive
  • 2017
VIEW 10 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security

  • AsiaCCS
  • 2016
VIEW 16 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2013
2019

CITATION STATISTICS

  • 5 Highly Influenced Citations

  • Averaged 7 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 18 REFERENCES

Low overhead broadcast encryption from multilinear maps

BWZ14. Dan Boneh, Brent Waters, Mark Zhandry
  • In Advances in Cryptology (Crypto),
  • 2014

Paterson , and Elizabeth A . Quaglia . Anonymous broadcast encryption : Adaptive security and efficient constructions in the standard model

B. Allison
  • Public Key Cryptography
  • 2012

Efficient trace and revoke schemes

  • International Journal of Information Security
  • 2010