Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext

被引:62
作者
Kim, Jongkil [1 ]
Susilo, Willy [1 ]
Au, Man Ho [2 ]
Seberry, Jennifer [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
关键词
Cryptography; public key; broadcast encryption; identity-based broadcast encryption; DUAL SYSTEM ENCRYPTION; FUNCTIONAL ENCRYPTION; EFFICIENT; HIBE;
D O I
10.1109/TIFS.2014.2388156
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present an adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext in the standard model. The size of the public key and the private keys of our system are both linear in the maximum number of receivers. In addition, our system is fully collusion-resistant and has stateless receivers. Compared with the state-of-the-art, our scheme is well optimized for the broadcast encryption. The computational complexity of decryption of our scheme depends only on the number of receivers, not the maximum number of receivers of the system. Technically, we employ dual system encryption technique and our proposal offers adaptive security under the general subgroup decisional assumption. Our scheme demonstrates that the adaptive security of the schemes utilizing a composite order group can be proven under the general subgroup decisional assumption, while many existing systems working in a composite order group are secure under multiple subgroup decision assumptions. We note that this finding is of an independent interest, which may be useful in other scenarios.
引用
收藏
页码:679 / 693
页数:15
相关论文
共 30 条
[1]  
[Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
[2]   Comparing the pairing efficiency over composite-order and prime-order elliptic curves [J].
Guillevic, Aurore .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7954 LNCS :357-372
[3]  
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[4]  
Attrapadung N, 2010, LECT NOTES COMPUT SC, V6056, P384
[5]  
Baek J, 2005, LECT NOTES COMPUT SC, V3386, P380
[6]  
Barbosa M, 2005, LECT NOTES COMPUT SC, V3796, P428
[7]  
Bellare M, 2011, LECT NOTES COMPUT SC, V6597, P235, DOI 10.1007/978-3-642-19571-6_15
[8]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[9]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[10]  
Boneh D., 2014, IACR CRYPTOL EPRINT, V2014, P195