Anonymous broadcast encryption with an untrusted gateway

被引:0
作者
Cui, Hui [1 ]
Mu, Yi [1 ]
Au, Man Ho [1 ]
机构
[1] School of Computer Science and Software Engineering, University of Wollongong, Wollongong
关键词
Anonymity; Broadcast encryption; Verifiable encryption;
D O I
10.1504/IJSN.2014.059326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a verifiable and anonymous broadcast encryption scheme, where an 'untrusted' gateway can verify incoming communication flows to ensure only the intended (anonymous) receivers in the target domain can receive them. This scenario is interesting while the privacy of receivers should be considered. The difficulty in this setting is how to achieve both confidentiality of the message and anonymity of receivers during the gateway verification. To achieve this goal, we introduce a new notion of encrypted identity search, which allows the gateway blindly verifies the incoming traffic. Our scheme captures security properties: confidentiality and anonymity against dishonest gateway, corrupted receivers and collusion attacks. We present a concrete construction of gatewaybased verifiable and anonymous broadcast encryption system from bilinear pairings, and give its security reduction under the computational assumptions related to bilinear pairings. Copyright © 2014 Inderscience Enterprises Ltd.
引用
收藏
页码:20 / 29
页数:9
相关论文
共 25 条
[1]  
Asokan N., Shoup V., Waidner M., Optimistic fair exchange of digital signatures (extended abstract), EUROCRYPT, Volume 1403 of Lecture Notes in Computer Science, pp. 591-606, (1998)
[2]  
Baek J., Safavi-Naini R., Susilo W., Public key encryption with keyword search revisited, ICCSA (1), Volume 5072 of Lecture Notes in Computer Science, pp. 1249-1259, (2008)
[3]  
Bao F., An efficient verifiable encryption scheme for encryption of discrete logarithms, CARDIS, Volume 1820 of Lecture Notes in Computer Science, pp. 213-220, (1998)
[4]  
Barth A., Boneh D., Waters B., Privacy in encrypted content distribution using private broadcast encryption, Financial Cryptography, Volume 4107 of Lecture Notes in Computer Science, pp. 52-64, (2006)
[5]  
Boneh D., Boyen X., Efficient selective identity-based encryption without random oracles, J. Cryptology, 24, 4, pp. 659-693, (2011)
[6]  
Boneh D., Crescenzo G.D., Ostrovsky R., Persiano G., Public key encryption with keyword search, EUROCRYPT, Volume 3027 of Lecture Notes in Computer Science, pp. 506-522, (2004)
[7]  
Boneh D., Franklin M., Identity-based encryption from the weil pairing, CRYPTO, Volume 2139 of Lecture Notes in Computer Science, pp. 213-219, (2001)
[8]  
Boneh D., Gentry C., Waters B., Collusion resistant broadcast encryption with short ciphertexts and private keys, CRYPTO, Volume 3621 of Lecture Notes in Computer Science, pp. 258-275, (2005)
[9]  
Boneh D., Katz J., Improved efficiency for cca-secure cryptosystems built using identity-based encryption, CT-RSA, Volume 3376 of Lecture Notes in Computer Science, pp. 87-103, (2005)
[10]  
Camenisch J., Lysyanskaya A., An efficient system for non-transferable anonymous credentials with optional anonymity revocation, EUROCRYPT, Volume 2045 of Lecture Notes in Computer Science, pp. 93-118, (2001)