Adaptively anonymous public-key broadcast encryption scheme without random oracle

被引:0
作者
Wang, Hao [1 ,2 ,3 ]
Wu, Lei [1 ,2 ]
机构
[1] School of Information Science and Engineering, Shandong Normal University
[2] Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology
[3] Shandong Provincial Key Laboratory of Software Engineering
关键词
Adaptively secure; Anonymous; DPVS; Dual system encryption; Public-key broadcast encryption;
D O I
10.4304/jnw.9.6.1656-1663
中图分类号
学科分类号
摘要
Anonymous is one of the most important security properties for kinds of Internet applications. In this paper, we consider the privacy-preserving problem in the context of public key broadcast encryption. We provide a new security definition for anonymous public key broadcast encryption, and construct a new scheme. To achieve anonymous, we blind the ciphertexts using the random factors. Moreover, we use a pair of orthogonal bases to construct secret key and ciphertexts for proper decryption. Our anonymous publickey broadcast encryption scheme can be proven in the adaptive model without random oracle. The key technique used to obtain our result is an elaborate combination of the dual system encryption proposed by Waters and a new approach on bilinear pairings using the notion of dual pairing vector spaces (DPVS) proposed by Okamoto and Takasima. © 2014 ACADEMY PUBLISHER.
引用
收藏
页码:1656 / 1663
页数:7
相关论文
共 26 条
  • [1] Fiat A., Naor M., Broadcast encryption, CRYPTO, pp. 480-491, (1993)
  • [2] Anzai J., Matsuzaki N., Matsumoto T., A quick group key distribution scheme with entity revocation, ASIACRYPT, pp. 333-347, (1999)
  • [3] Naor M., Pinkas B., Efficient trace and revoke schemes, Financial Cryptography, pp. 1-20, (2000)
  • [4] Naor D., Naor M., Lotspiech J., Revocation and tracing schemes for stateless receivers, CRYPTO, pp. 41-62, (2001)
  • [5] Halevy D., Shamir A., The lsd broadcast encryption scheme, CRYPTO, pp. 47-60, (2002)
  • [6] Dodis Y., Fazio N., Public key broadcast encryption for stateless receivers, Digital Rights Management Workshop, pp. 61-80, (2002)
  • [7] Dodis Y., Fazio N., Public key trace and revoke scheme secure against adaptive chosen ciphertext attack, Public Key Cryptography, pp. 100-115, (2003)
  • [8] Attrapadung N., Kobara K., Imai H., Sequential key derivation patterns for broadcast encryption and key predistribution schemes, ASIACRYPT, pp. 374-391, (2003)
  • [9] Goodrich M.T., Sun J.Z., Tamassia R., Efficient tree-based revocation in groups of low-state devices, CRYPTO, pp. 511-527, (2004)
  • [10] Boneh D., Gentry C., Waters B., Collusion resistant broadcast encryption with short ciphertexts and private keys, CRYPTO, pp. 258-275, (2005)