An efficient privacy-preserving identity-based broadcast signcryption for large-scale wireless sensor networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, I.T. | - |
dc.contributor.author | Hwang, S.O. | - |
dc.date.accessioned | 2021-11-11T04:42:54Z | - |
dc.date.available | 2021-11-11T04:42:54Z | - |
dc.date.created | 2021-11-10 | - |
dc.date.issued | 2013 | - |
dc.identifier.issn | 1343-4500 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/17224 | - |
dc.description.abstract | Previous identity-based broadcast encryption schemes have mainly focused on reducing the ciphertext and key size. These efforts have resulted in computation and/or storage overhead on a user's side. Therefore, they are not scalable for large scaled networks. In addition, they do not protect the privacy of both senders and receivers, which may be critical in high-level security applications. Most of them do not provide source authencation property. This allows an adversary to launch impersonating attacks. In this paper, we propose an efficient, privacy-preserving identity-based broadcast signcryption scheme suitable for sensor networks by significantly reducing both computation and storage overhead: all of the public key, private keys, and ciphertexts are of constant size. Furthermore, the proposed scheme is also efficient in communication overhead by removing the set of receivers from ciphertexts. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | International Information Institute Ltd. | - |
dc.title | An efficient privacy-preserving identity-based broadcast signcryption for large-scale wireless sensor networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hwang, S.O. | - |
dc.identifier.scopusid | 2-s2.0-84877255192 | - |
dc.identifier.bibliographicCitation | Information (Japan), v.16, no.3 A, pp.1787 - 1792 | - |
dc.relation.isPartOf | Information (Japan) | - |
dc.citation.title | Information (Japan) | - |
dc.citation.volume | 16 | - |
dc.citation.number | 3 A | - |
dc.citation.startPage | 1787 | - |
dc.citation.endPage | 1792 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | Identity-based broadcast encryption | - |
dc.subject.keywordAuthor | Identity-based broadcast signcryption | - |
dc.subject.keywordAuthor | Identity-based encryption | - |
dc.subject.keywordAuthor | Sensor network | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.