Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext

被引:60
|
作者
Kim, Jongkil [1 ]
Susilo, Willy [1 ]
Au, Man Ho [2 ]
Seberry, Jennifer [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
关键词
Cryptography; public key; broadcast encryption; identity-based broadcast encryption; DUAL SYSTEM ENCRYPTION; FUNCTIONAL ENCRYPTION; EFFICIENT; HIBE;
D O I
10.1109/TIFS.2014.2388156
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present an adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext in the standard model. The size of the public key and the private keys of our system are both linear in the maximum number of receivers. In addition, our system is fully collusion-resistant and has stateless receivers. Compared with the state-of-the-art, our scheme is well optimized for the broadcast encryption. The computational complexity of decryption of our scheme depends only on the number of receivers, not the maximum number of receivers of the system. Technically, we employ dual system encryption technique and our proposal offers adaptive security under the general subgroup decisional assumption. Our scheme demonstrates that the adaptive security of the schemes utilizing a composite order group can be proven under the general subgroup decisional assumption, while many existing systems working in a composite order group are secure under multiple subgroup decision assumptions. We note that this finding is of an independent interest, which may be useful in other scenarios.
引用
收藏
页码:679 / 693
页数:15
相关论文
共 50 条
  • [31] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [32] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [33] Provably Secure Anonymous Multi-Receiver Identity-Based Encryption with Shorter Ciphertext
    Wang, Huaqun
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 85 - 90
  • [34] Efficient chosen ciphertext secure identity-based encryption against key leakage attacks
    Sun, Shi-Feng
    Gu, Dawu
    Liu, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1417 - 1434
  • [35] Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Weng, Jian
    Zhao, Yunlei
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 77 - 92
  • [36] Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
    Yamada, Shota
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 32 - 62
  • [37] Adaptively Secure Broadcast Encryption with Dealership
    Acharya, Kamalesh
    Dutta, Ratna
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 161 - 177
  • [38] Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors
    Fan, Jingjing
    Lu, Xingye
    Au, Man Ho
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 320 - 340
  • [39] Secure and practical identity-based encryption
    Naccache, D.
    IET INFORMATION SECURITY, 2007, 1 (02) : 59 - 64
  • [40] Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security
    Xu, Peng
    Li, Jingnan
    Wang, Wei
    Jin, Hai
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 223 - 233