Efficient and adaptively secure broadcast encryption systems

被引:10
作者
Zhang, Mingwu [1 ,2 ]
Yang, Bo [1 ,3 ]
Chen, Zhenhua [3 ]
Takagi, Tsuyoshi [2 ]
机构
[1] South China Agr Univ, Coll Informat, Guangzhou 510642, Guangdong, Peoples R China
[2] Kyushu Univ, Inst Math Ind, Fukuoka 8190395, Japan
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
基金
中国国家自然科学基金;
关键词
broadcast encryption; boundless receiver; adaptive security; dual-system encryption; IDENTITY-BASED ENCRYPTION; RANDOM ORACLES; SHORT CIPHERTEXTS; SCHEMES; HIBE;
D O I
10.1002/sec.678
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption is an effective way to broadcast a message securely such that more than one privileged receiver can decrypt it. The well-known constructions of identity-based broadcast encryption only support bounded broadcast users that had to deploy the maximum user number in advance. This is somewhat inefficient and impractical if the broadcast user number is predetermined. In this paper, we propose an adaptively secure identity-based broadcast encryption in the standard model that supports arbitrary number of users in broadcast set, which eliminates the size of public parameters with a constant number of group elements O(1) and obtain short ciphertexts, secret keys, and public parameters. We use the techniques of semi-functional ciphertexts and semi-functional keys in orthogonal subgroups to implement the boundless broadcast set and adaptive security by means of dual-system encryption mechanism in a composite-order group, and we prove the scheme to be fully secure without the random oracles in the static assumptions. The proposed scheme captures the properties of confidentiality, adaptive security, constant key, and short ciphertext. We also evaluate the computational costs and communication overheads and give the deployment in secure set-top box broadcast systems. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1044 / 1052
页数:9
相关论文
共 50 条
  • [41] Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage
    Watanabe, Yohei
    Shikata, Junji
    PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 489 - 502
  • [42] (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard
    Barthoulot, Anais
    Blazy, Olivier
    Canard, Sebastien
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2022, 2022, 13641 : 143 - 164
  • [43] Fully Secure Broadcast Encryption for Inner-Product Predicates
    Sun Jin
    Hu Yu-pu
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 316 - 320
  • [44] Efficient One-Sided Adaptively Secure Computation
    Hazay, Carmit
    Patra, Arpita
    JOURNAL OF CRYPTOLOGY, 2017, 30 (01) : 321 - 371
  • [45] CCA Secure Broadcast Encryption Based on SM9
    Lai J.-C.
    Huang X.-Y.
    He D.-B.
    Ning J.-T.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (07): : 3354 - 3364
  • [46] Adaptively anonymous public-key broadcast encryption scheme without random oracle
    Wang, Hao
    Wu, Lei
    Journal of Networks, 2014, 9 (06) : 1656 - 1663
  • [47] On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption
    Stinson D.R.
    Designs, Codes and Cryptography, 1997, 12 (3) : 215 - 243
  • [48] Efficient One-Sided Adaptively Secure Computation
    Carmit Hazay
    Arpita Patra
    Journal of Cryptology, 2017, 30 : 321 - 371
  • [49] Efficient Anonymous Broadcast Encryption with Adaptive Security
    Zhou, Fu-Cai
    Lin, Mu-Qing
    Zhou, Yang
    Li, Yu-Xi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (11): : 4680 - 4700
  • [50] Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage
    Watanabe, Yohei
    Shikata, Junji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (06): : 1097 - 1106