Fully secure predicate-based broadcast encryption

被引:0
作者
Sun, Jin [1 ,2 ]
Hu, Yupu [2 ]
Wang, Shangping [1 ]
机构
[1] Department of Application Mathematics in Xi'an University of Technology
[2] Key Lab. of Computer Network and Information Security, Xidian University
来源
Journal of Computational Information Systems | 2014年 / 10卷 / 02期
关键词
Broadcast encryption; Full security; Predicate encryption; Provably secure;
D O I
10.12733/jcis8929
中图分类号
学科分类号
摘要
According to the broadcast encryption scheme with wide applications in the real world, a fully secure predicate-based broadcast encryption was proposed by combining with Waters dual system encryption, predicate encryption and the orthogonality property of composite-order bilinear groups. Based on the standard model, the scheme can achieve constant-size key and ciphertext, and guarantee the security of the plaintext M as well as the security of the attribute vectors. The scheme is proved by using the three static assumptions. Furthermore, the analysis results indicated that the scheme of this paper is fully secure and can satisfy the higher efficiency and practice requirement. Copyright © 2014 Binary Information Press.
引用
收藏
页码:611 / 618
页数:7
相关论文
共 12 条
  • [1] Fiat A., Naor M., Broadcast encryption, CRYPTO0 93, pp. 480-491, (1993)
  • [2] Sun J., Hu Y.P., Zhang L.Y., CCA-secure unidirectional proxy broadcast re-encryption in the standard model, Journal of Computational Information Systems, 8, 14, pp. 5909-5916, (2012)
  • [3] Delerablee C., Paillier P., Pointcheval D., Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys, Pairing 2007. LNCS. 4575, pp. 39-59, (2007)
  • [4] Hu L., Liu Z.L., Cheng X.H., Efficient identity-based broadcast encryption without random oracles, Journal of Computers, 5, 3, pp. 331-336, (2010)
  • [5] Gao S., Ma W.P., Zhao Y.B., Zhuo Z.P., Walsh spectrum of cryptographically concatenating functions and its applications in constructing resilient Boolean functions, Journal of Computational Information Systems, 7, 4, pp. 1074-1081, (2011)
  • [6] Zhang L.Y., Hu Y.P., Mu N.B., Identity-based broadcast encryption protocol for ad hoc networks, IEEE Computer Society, pp. 1619-1623, (2009)
  • [7] Dan B., Giovanni D.C., Rafail O., Public key encryption with keyword search, Advances in Cryptology-EUROCRYPT 2004, LNCS. 3027, pp. 506-522
  • [8] Dan B., Brent W., Conjunctive, subset and range queries on encrypted data, TCC 2007: 4th Theory of Cryptography Conference, LNCS. 4392, pp. 535-554, (2007)
  • [9] Jonathan K., Amit S., Brent W., Predicate encryption supporting disjunction, polynomial equations, and inner products, Advances in Cryptology-EUROCRYPT 2008, LNCS. 4965, pp. 146-162, (2008)
  • [10] Allison L., Tatsuaki O., Amit S., Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, Advances in Cryptology-EUROCRYPT 201, pp. 62-91, (2010)