Efficient and adaptively secure broadcast encryption systems

被引:10
作者
Zhang, Mingwu [1 ,2 ]
Yang, Bo [1 ,3 ]
Chen, Zhenhua [3 ]
Takagi, Tsuyoshi [2 ]
机构
[1] South China Agr Univ, Coll Informat, Guangzhou 510642, Guangdong, Peoples R China
[2] Kyushu Univ, Inst Math Ind, Fukuoka 8190395, Japan
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
基金
中国国家自然科学基金;
关键词
broadcast encryption; boundless receiver; adaptive security; dual-system encryption; IDENTITY-BASED ENCRYPTION; RANDOM ORACLES; SHORT CIPHERTEXTS; SCHEMES; HIBE;
D O I
10.1002/sec.678
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption is an effective way to broadcast a message securely such that more than one privileged receiver can decrypt it. The well-known constructions of identity-based broadcast encryption only support bounded broadcast users that had to deploy the maximum user number in advance. This is somewhat inefficient and impractical if the broadcast user number is predetermined. In this paper, we propose an adaptively secure identity-based broadcast encryption in the standard model that supports arbitrary number of users in broadcast set, which eliminates the size of public parameters with a constant number of group elements O(1) and obtain short ciphertexts, secret keys, and public parameters. We use the techniques of semi-functional ciphertexts and semi-functional keys in orthogonal subgroups to implement the boundless broadcast set and adaptive security by means of dual-system encryption mechanism in a composite-order group, and we prove the scheme to be fully secure without the random oracles in the static assumptions. The proposed scheme captures the properties of confidentiality, adaptive security, constant key, and short ciphertext. We also evaluate the computational costs and communication overheads and give the deployment in secure set-top box broadcast systems. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1044 / 1052
页数:9
相关论文
共 50 条
  • [31] Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
    Okamoto, Tatsuaki
    Takashima, Katsuyuki
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (2-3) : 725 - 771
  • [32] Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
    Okamoto, Tatsuaki
    Takashima, Katsuyuki
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 138 - +
  • [33] Efficient broadcast encryption with user profiles
    Ak, Murat
    Kaya, Kamer
    Onarlioglu, Kaan
    Selcuk, Ali Aydin
    INFORMATION SCIENCES, 2010, 180 (06) : 1060 - 1072
  • [34] Efficient Broadcast Encryption with Personalized Messages
    Ohtake, Go
    Hanaoka, Goichiro
    Ogawa, Kazuto
    PROVABLE SECURITY, 2010, 6402 : 214 - +
  • [35] Fully secure predicate-based broadcast encryption
    Sun, Jin
    Hu, Yupu
    Wang, Shangping
    Journal of Computational Information Systems, 2014, 10 (02): : 611 - 618
  • [36] Constructing provable secure broadcast encryption scheme with dealership
    Acharya, Kamalesh
    Dutta, Ratna
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [37] Broadcast Encryption with Guessing Secrecy
    Watanabe, Yohei
    INFORMATION THEORETIC SECURITY, ICITS 2017, 2017, 10681 : 39 - 57
  • [38] Adaptively Secure Hierarchical Identity-Based Encryption over Lattice
    Zhang, Leyou
    Wu, Qing
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 46 - 58
  • [39] Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
    Choi, Seung Geol
    Dachman-Soled, Dana
    Malkin, Tal
    Wee, Hoeteck
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 287 - +
  • [40] Authenticated public key broadcast encryption scheme secure against insiders' attack
    Park, Chanil
    Hur, Junbeom
    Hwang, Seongoun
    Yoon, Hyunsoo
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 113 - 122