Public key broadcast encryption with low number of keys and constant decryption time

被引:0
作者
Liu, Yi-Ru [1 ]
Tzeng, Wen-Guey [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 30050, Taiwan
来源
PUBLIC KEY CRYPTOGRAPHY - PKC 2008 | 2008年 / 4939卷
关键词
broadcast encryption; polynomial interpolation; collusion;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we propose three public key BE schemes that have efficient complexity measures. The first scheme, called the BE-PI scheme, has O(r) header size, O(1) public keys and O(log N) private keys per user, where r is the number of revoked users. This is the first public key BE scheme that has both public and private keys under O(log N) while the header size is O(r). These complexity measures match those of efficient secret key BE schemes. Our second scheme, called the PK-SD-PI scheme, has O(r) header size, O(1) public key and O(log(2) N) private keys per user. They are the same as those of the SD scheme. Nevertheless, the decryption time is remarkably O(1). This is the first public key BE scheme that has O(1) decryption time while other complexity measures are kept low. The third scheme, called, the PK-LSD-PI scheme, is constructed in the same way, but based on the LSD method. It has O(r/epsilon) ciphertext size and O(log(1+epsilon) N) private keys per user, where 0 < epsilon < 1. The decryption time is also O(1). Our basic schemes are one-way secure against full collusion of revoked users in the random oracle model under the BDH assumption. We can modify our schemes to have indistinguishably security against adaptive chosen ciphertext attacks.
引用
收藏
页码:380 / 396
页数:17
相关论文
共 22 条
  • [1] Attrapadung N, 2005, LECT NOTES COMPUT SC, V3788, P100
  • [2] Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
  • [3] Hierarchical identity based encryption with constant size ciphertext
    Boneh, D
    Boyen, X
    Goh, EJ
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
  • [4] Boneh D., 2006, P ACM C COMPUTER COM, P211, DOI [10.1145/1180405.1180432, DOI 10.1145/1180405.1180432]
  • [5] Boneh D., 1999, CRYPTO, DOI DOI 10.1007/3-540-48405-1
  • [6] Dodis Y, 2002, LECT NOTES COMPUT SC, V2696, P61
  • [7] Dodis Y, 2003, LECT NOTES COMPUT SC, V2567, P100
  • [8] Fiat A., 1994, LECT NOTES COMPUTER, V773, P480, DOI DOI 10.1007/3-540-48329-2
  • [9] Fujisaki E., 1999, LNCS, V1666, P537, DOI DOI 10.1007/3-540-48405-1_34
  • [10] Galindo D, 2005, LECT NOTES COMPUT SC, V3580, P791