ABSTRACT

Contents 12.1 Introduction ................................................................................................................... 240 12.2 Related Work ..................................................................................................................241 12.3 Preliminaries .................................................................................................................. 242

12.3.1 Definitions and Computational Assumptions ..................................................... 242 12.3.2 Security Model ................................................................................................... 243

12.4 Privacy-Preserving Identity-Based Broadcast Encryption Scheme .................................. 244 12.5 Proof of Correctness ........................................................................................................247 12.6 Discussion .......................................................................................................................247 12.7 Analysis ...........................................................................................................................249