Call for Paper

CAE solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 30, 2023.

Read More

Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree

Ali Meligy, Ayman Alazab. Published in Security.

Communications on Applied Electronics
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Ali Meligy, Ayman Alazab

Ali Meligy and Ayman Alazab. Article: Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree. Communications on Applied Electronics 4(9):31-35, April 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Ali Meligy and Ayman Alazab},
	title = {Article: Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree},
	journal = {Communications on Applied Electronics},
	year = {2016},
	volume = {4},
	number = {9},
	pages = {31-35},
	month = {April},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


In this paper, we suggest the security tree scheme using dynamic identity-based broadcast encryption, using this scheme, it is possible to parted a message to many linked nodes and represent these nodes as security tree and give every receiver permission to read special linked nodes from security tree.


  1. Jeong, H., Won, D.: Access-control-based Efficient Privacy Protection Method for Social Networking Services. Journal of The Korea Institute of Information Security & Cryptology 1(23), 81–88 (2013).
  2. Youngman Jung, Yoonho Nam, Jiye Kim, Woongryul Jeon, Hanwook Lee, and Dongho Won.: Key Management Scheme Using Dynamic Identity-Based Broadcast Encryption for Social Network Services College of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-dong, Jangan-gu, Suwon-si, Gyeonggi-do, 440-746, Korea
  3. Yeung, C.A., Licaardi, L., Lu, K., Seneviratne, O., Lee, T.B.: Decentralization: The future of online social networking. In: Proc. Int. Joint Conf. W3C Workshop (2009).
  4. Datta, A., Buchegger, S., Vu, L.H., Strufe, T., Rzadca, K.: Decentralized online social networks. In: Handbook of Social Network Technologies and Applications, pp. 349–378 (2010).
  5. Cutillo, L.A., Molva, R., Strufe, T.: Privacy preserving social networking through decentralization. Wireless On-Demand Network Systems and Services, 145–152 (2009).
  6. Zhang. : Identity-Based Broadcast Encryption with Recipient Privacy. In 978-1-4244-5539- 3/10/$26.00 ©2010 IEEE (2010).
  7. Jiang, H., Xu, Q., Shang, J.: An efficient dynamic identity-based broadcast encryption scheme. In: 2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE), pp. 27–32 (2010).
  8. Boldyreva. : Identity-based Encryption with Efficient Revocation. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2008, ACM Press, 2008.
  9. Ajami, R., Ramadan, N., Mohamed, N., Al-Jaroodi, J.: Security Challenges and Approaches in Online Social Networks: A Survey. International Journal of Computer Science and Network Security 11(8) (August 2011).
  10. Zilpelwar, R.A., Bedi, R.K., Wadhai, V.M.: An Overview of Privacy and Security in SNS. International Journal of P2P Network Trends and Technology 2(1) (2012)\


Social Network Service, Decentralized, DIBBE, Security Tree.