Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext

被引:60
|
作者
Kim, Jongkil [1 ]
Susilo, Willy [1 ]
Au, Man Ho [2 ]
Seberry, Jennifer [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
关键词
Cryptography; public key; broadcast encryption; identity-based broadcast encryption; DUAL SYSTEM ENCRYPTION; FUNCTIONAL ENCRYPTION; EFFICIENT; HIBE;
D O I
10.1109/TIFS.2014.2388156
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present an adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext in the standard model. The size of the public key and the private keys of our system are both linear in the maximum number of receivers. In addition, our system is fully collusion-resistant and has stateless receivers. Compared with the state-of-the-art, our scheme is well optimized for the broadcast encryption. The computational complexity of decryption of our scheme depends only on the number of receivers, not the maximum number of receivers of the system. Technically, we employ dual system encryption technique and our proposal offers adaptive security under the general subgroup decisional assumption. Our scheme demonstrates that the adaptive security of the schemes utilizing a composite order group can be proven under the general subgroup decisional assumption, while many existing systems working in a composite order group are secure under multiple subgroup decision assumptions. We note that this finding is of an independent interest, which may be useful in other scenarios.
引用
收藏
页码:679 / 693
页数:15
相关论文
共 50 条
  • [41] A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme
    Ge, Chunpeng
    Wang, Jiandong
    Fang, Liming
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 347 - 360
  • [42] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [43] Augmented broadcaster identity-based broadcast encryption
    1600, Digital Information Research Foundation, 2 Srinivasamoorthy Avenue, L.B Road, Adyar, Chennai, 600 020, India (11):
  • [44] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 539 - 549
  • [45] Identity-Based Broadcast Encryption for Inner Products
    Lai, Jianchang
    Mu, Yi
    Gu, Fuchun
    Jiang, Peng
    Ma, Sha
    COMPUTER JOURNAL, 2018, 61 (08): : 1240 - 1251
  • [46] Identity-based Broadcast Encryption with Shorter Transmissions
    张乐友
    胡予濮
    牟宁波
    Journal of Shanghai Jiaotong University(Science), 2008, 13 (06) : 641 - 645
  • [47] Chosen-ciphertext secure hierarchical identity-based encryption from R-LWE
    Jiang, Xue-Feng
    Wang, Ting
    Sun, Zhi-Wei
    Journal of Computers (Taiwan), 2020, 31 (01) : 320 - 331
  • [48] Identity-based broadcast encryption with shorter transmissions
    Zhang L.-Y.
    Hu Y.-P.
    Mu N.-B.
    J. Shanghai Jiaotong Univ. Sci., 2008, 6 (641-645): : 641 - 645
  • [49] Identity-Based Broadcast Encryption with Recipient Privacy
    Zhang, Weimin
    Xu, Qiuliang
    He, Peng
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 483 - 487
  • [50] Broadcast encryption using identity-based cryptosystem
    Lv, Xixiang
    Yang, Bo
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (04): : 716 - 720