Two new ID-based conference key broadcast systems are proposed in this paper. The conference key can be distributed knowing only the receivers' identities. Only one copy of the ciphertexts is required to broadcast to all users. The security of these new schemes is based on the difficulty of factorization as well as computing the discrete logarithm. We investigate their security and give a comparison to a recently proposed scheme.
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Hardware and Architecture
- Computational Theory and Mathematics