Call for Paper
CAE solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 30, 2023.
Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree
Ali Meligy and Ayman Alazab. Article: Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree. Communications on Applied Electronics 4(9):31-35, April 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX
@article{key:article, author = {Ali Meligy and Ayman Alazab}, title = {Article: Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree}, journal = {Communications on Applied Electronics}, year = {2016}, volume = {4}, number = {9}, pages = {31-35}, month = {April}, note = {Published by Foundation of Computer Science (FCS), NY, USA} }
Abstract
In this paper, we suggest the security tree scheme using dynamic identity-based broadcast encryption, using this scheme, it is possible to parted a message to many linked nodes and represent these nodes as security tree and give every receiver permission to read special linked nodes from security tree.
References
- Jeong, H., Won, D.: Access-control-based Efficient Privacy Protection Method for Social Networking Services. Journal of The Korea Institute of Information Security & Cryptology 1(23), 81–88 (2013).
- Youngman Jung, Yoonho Nam, Jiye Kim, Woongryul Jeon, Hanwook Lee, and Dongho Won.: Key Management Scheme Using Dynamic Identity-Based Broadcast Encryption for Social Network Services College of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-dong, Jangan-gu, Suwon-si, Gyeonggi-do, 440-746, Korea
- Yeung, C.A., Licaardi, L., Lu, K., Seneviratne, O., Lee, T.B.: Decentralization: The future of online social networking. In: Proc. Int. Joint Conf. W3C Workshop (2009).
- Datta, A., Buchegger, S., Vu, L.H., Strufe, T., Rzadca, K.: Decentralized online social networks. In: Handbook of Social Network Technologies and Applications, pp. 349–378 (2010).
- Cutillo, L.A., Molva, R., Strufe, T.: Privacy preserving social networking through decentralization. Wireless On-Demand Network Systems and Services, 145–152 (2009).
- Zhang. : Identity-Based Broadcast Encryption with Recipient Privacy. In 978-1-4244-5539- 3/10/$26.00 ©2010 IEEE (2010).
- Jiang, H., Xu, Q., Shang, J.: An efficient dynamic identity-based broadcast encryption scheme. In: 2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE), pp. 27–32 (2010).
- Boldyreva. : Identity-based Encryption with Efficient Revocation. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2008, ACM Press, 2008.
- Ajami, R., Ramadan, N., Mohamed, N., Al-Jaroodi, J.: Security Challenges and Approaches in Online Social Networks: A Survey. International Journal of Computer Science and Network Security 11(8) (August 2011).
- Zilpelwar, R.A., Bedi, R.K., Wadhai, V.M.: An Overview of Privacy and Security in SNS. International Journal of P2P Network Trends and Technology 2(1) (2012)\
Keywords
Social Network Service, Decentralized, DIBBE, Security Tree.