Efficient and adaptively secure broadcast encryption systems

被引:10
|
作者
Zhang, Mingwu [1 ,2 ]
Yang, Bo [1 ,3 ]
Chen, Zhenhua [3 ]
Takagi, Tsuyoshi [2 ]
机构
[1] South China Agr Univ, Coll Informat, Guangzhou 510642, Guangdong, Peoples R China
[2] Kyushu Univ, Inst Math Ind, Fukuoka 8190395, Japan
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
基金
中国国家自然科学基金;
关键词
broadcast encryption; boundless receiver; adaptive security; dual-system encryption; IDENTITY-BASED ENCRYPTION; RANDOM ORACLES; SHORT CIPHERTEXTS; SCHEMES; HIBE;
D O I
10.1002/sec.678
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption is an effective way to broadcast a message securely such that more than one privileged receiver can decrypt it. The well-known constructions of identity-based broadcast encryption only support bounded broadcast users that had to deploy the maximum user number in advance. This is somewhat inefficient and impractical if the broadcast user number is predetermined. In this paper, we propose an adaptively secure identity-based broadcast encryption in the standard model that supports arbitrary number of users in broadcast set, which eliminates the size of public parameters with a constant number of group elements O(1) and obtain short ciphertexts, secret keys, and public parameters. We use the techniques of semi-functional ciphertexts and semi-functional keys in orthogonal subgroups to implement the boundless broadcast set and adaptive security by means of dual-system encryption mechanism in a composite-order group, and we prove the scheme to be fully secure without the random oracles in the static assumptions. The proposed scheme captures the properties of confidentiality, adaptive security, constant key, and short ciphertext. We also evaluate the computational costs and communication overheads and give the deployment in secure set-top box broadcast systems. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1044 / 1052
页数:9
相关论文
共 50 条
  • [21] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Li, Yan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 35 - 50
  • [22] Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
    Garay, Juan A.
    Wichs, Daniel
    Zhou, Hong-Sheng
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 505 - 523
  • [23] Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption
    Kitagawa, Takashi
    Kojima, Hiroki
    Attrapadung, Nuttapong
    Imai, Hideki
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 87 - 99
  • [24] Provable Secure Constructions for Broadcast Encryption with Personalized Messages
    Acharya, Kamalesh
    Dutta, Ratna
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 329 - 348
  • [25] Fully secure attribute-based broadcast encryption
    Sun, J. (oksunjin@xaut.edu.cn), 2012, Science Press (39): : 23 - 28+154
  • [26] Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    Zhang Miao
    CHINA COMMUNICATIONS, 2012, 9 (09) : 22 - 40
  • [27] Secure and efficient public key multi-channel broadcast encryption schemes
    Acharya, Kamalesh
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [28] Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
    Kim, Jihye
    Lee, Seunghwa
    Lee, Jiwon
    Oh, Hyunok
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1593 - 1600
  • [29] Adaptively Secure Non-interactive Threshold Cryptosystems
    Libert, Benoit
    Yung, Moti
    Automata, Languages and Programming, ICALP, Pt II, 2011, 6756 : 588 - 600
  • [30] Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
    Wu, Qianhong
    Qin, Bo
    Zhang, Lei
    Domingo-Ferrer, Josep
    Farras, Oriol
    Manjon, Jesus A.
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (02) : 466 - 479