Efficient Anonymous Multi-group Broadcast Encryption

被引:2
作者
Kim, Intae [1 ]
Hwang, Seong Oun [2 ]
Susilo, Willy [1 ]
Baek, Joonsang [1 ]
Kim, Jongkil [1 ]
机构
[1] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[2] Gachon Univ, Dept Comp Engn, Coll IT Convergence, Gyeonggi, South Korea
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I | 2020年 / 12146卷
基金
新加坡国家研究基金会; 澳大利亚研究理事会;
关键词
Multi-channel broadcast encryption; Anonymous multi-group broadcast encryption; Inner product evaluation; Broadcast encryption; FUNCTIONAL ENCRYPTION; PREDICATE ENCRYPTION; CONSTRUCTIONS; CIPHERTEXTS; SCHEME;
D O I
10.1007/978-3-030-57808-4_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, broadcasters must supply diverse content to multiple groups without delay in platforms such as social media and streaming sites. Unfortunately, conventional broadcast encryption schemes are deemed unsuitable for such platforms since they generate an independent ciphertext for each piece of contents and hence the number of headers generated during encryption increases linearly with the size of contents. The increased number of headers will result in wasting a limited network bandwidth, which makes the application impractical. To resolve this issue, multi-channel broadcast encryption was proposed in the literature, which transmits a single header for multiple channels to several groups of viewers at a time. However, the multi-channel broadcast encryption is also impractical because it requires heavy computations, communications, and storage overheads. Moreover, it should also address additional issues, such as receiver privacy (anonymity), static user-set size, and limited encryption. In this work, we aim to tackle this problem by proposing an efficient broadcast encryption scheme, called "anonymous multi-group broadcast encryption". This primitive achieves faster encryption and decryption, provides smaller sized public parameters, private keys, and ciphertexts. Hence, it solves the aforementioned issues of the multi-channel broadcast encryption. Specifically, the proposed scheme provides provable anonymity and confidentiality based on the External Diffie-Hellman (XDH) and P-Decisional Bilinear Diffie-Hellman (DBDH) assumptions, respectively, in the standard model.
引用
收藏
页码:251 / 270
页数:20
相关论文
共 35 条
[1]  
Abdalla M., 2016, Paper 2016/011, V2016
[2]   Simple Functional Encryption Schemes for Inner Products [J].
Abdalla, Michel ;
Bourse, Florian ;
De Caro, Angelo ;
Pointcheval, David .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 :733-751
[3]   Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework [J].
Acharya, Kamalesh ;
Dutta, Ratna .
CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 :495-515
[4]  
[Anonymous], 1994, ADV CRYPTOLOGY CRYPT, DOI DOI 10.1007/3-540-48329-2
[5]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[6]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[7]   Function-Hiding Inner Product Encryption [J].
Bishop, Allison ;
Jain, Abhishek ;
Kowalczyk, Lucas .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 :470-491
[8]   Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes [J].
Bloemer, Johannes ;
Liske, Gennadij .
TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 :431-447
[9]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[10]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16