Adaptively anonymous public-key broadcast encryption scheme without random oracle

被引:0
作者
Wang, Hao [1 ,2 ,3 ]
Wu, Lei [1 ,2 ]
机构
[1] School of Information Science and Engineering, Shandong Normal University
[2] Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology
[3] Shandong Provincial Key Laboratory of Software Engineering
关键词
Adaptively secure; Anonymous; DPVS; Dual system encryption; Public-key broadcast encryption;
D O I
10.4304/jnw.9.6.1656-1663
中图分类号
学科分类号
摘要
Anonymous is one of the most important security properties for kinds of Internet applications. In this paper, we consider the privacy-preserving problem in the context of public key broadcast encryption. We provide a new security definition for anonymous public key broadcast encryption, and construct a new scheme. To achieve anonymous, we blind the ciphertexts using the random factors. Moreover, we use a pair of orthogonal bases to construct secret key and ciphertexts for proper decryption. Our anonymous publickey broadcast encryption scheme can be proven in the adaptive model without random oracle. The key technique used to obtain our result is an elaborate combination of the dual system encryption proposed by Waters and a new approach on bilinear pairings using the notion of dual pairing vector spaces (DPVS) proposed by Okamoto and Takasima. © 2014 ACADEMY PUBLISHER.
引用
收藏
页码:1656 / 1663
页数:7
相关论文
共 26 条
  • [21] Ren Y., Gu D., Fully cca2 secure identity based broadcast encryption without random oracles, Inf. Process. Lett, 109, 11, pp. 527-533, (2009)
  • [22] Barth A., Boneh D., Waters B., Privacy in encrypted content distribution using private broadcast encryption, Financial Cryptography, pp. 52-64, (2006)
  • [23] Hur J., Park C., Hwang S., Privacy-preserving identity-based broadcast encryption, Information Fusion, 13, 4, pp. 296-303, (2012)
  • [24] Okamoto T., Takashima K., Homomorphic encryption and signatures from vector decomposition, Pairing, pp. 57-74, (2008)
  • [25] Waters B., Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions, CRYPTO, pp. 619-636, (2009)
  • [26] Lewko A.B., Okamoto T., Sahai A., Takashima K., Waters B., Fully secure functional encryption: Attributebased encryption and (hierarchical) inner product encryption, EUROCRYPT, pp. 62-91, (2010)