Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption

被引:4
作者
Minh Ha Le [1 ]
Vinh Duc Tran [2 ]
Van Anh Trinh [3 ]
Viet Cuong Trinh [4 ]
机构
[1] VNU Univ Sci, Fac Math Mech Informat, 334 Nguyen Trai Str, Hanoi, Vietnam
[2] Hanoi Univ Sci & Technol, Hanoi, Vietnam
[3] Van Hoa The Thao Va Du Lich Univ, Thanh Hoa, Vietnam
[4] Hong Duc Univ, Thanh Hoa, Vietnam
关键词
Broadcast encryption; Multi-channel broadcast encryption; Attribute-based encryption; CONSTANT SIZE CIPHERTEXTS; SCHEME; SECURE;
D O I
10.1016/j.tcs.2019.11.034
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-channel broadcast encryption (MCBE) and Attribute-based encryption (ABE) are important primitives used in a broad range of concrete application scenarios such as Pay-TV, e-Health, Cloud Storage, Blockchain and so on. The former allows a sender to efficiently send different messages to arbitrarily chosen sets of users (target sets) at the same time, while the latter supports more sophisticated access control by allowing both the encryption and decryption phases to be based on the user's attributes. Recently, Canard el al. at Theoretical Computer Science'18 proposed a new technique for compacting header size in both MCBE and ABE. However, their technique leads to schemes in secret-key setting which has limited applications in practice. In this paper, we propose a new technique also for compacting header size in both MCBE and ABE, but our technique leads to schemes in public key setting which therefore can overcome the weakness mentioned above of the Canard el al.'s technique. We finally implement our MCBE and ABE schemes to give some concrete benchmarks. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:219 / 235
页数:17
相关论文
共 48 条
[31]  
Herranz J, 2010, LECT NOTES COMPUT SC, V6056, P19
[32]  
Hohenberger S, 2013, LECT NOTES COMPUT SC, V7778, P162, DOI 10.1007/978-3-642-36362-7_11
[33]  
Junod Pascal., 2010, Proc. ACM DRM'10, P13, DOI DOI 10.1145/1866870.1866875
[34]   Making Any Attribute-Based Encryption Accountable, Efficiently [J].
Lai, Junzuo ;
Tang, Qiang .
COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 :527-547
[35]   Revocation Systems with Very Small Private Keys [J].
Lewko, Allison ;
Sahai, Amit ;
Waters, Brent .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :273-285
[36]  
Lynn B., The stanford pairing based crypto library
[37]   Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices [J].
Malluhi, Q. M. ;
Shikfa, A. ;
Tran, V. D. ;
Trinh, V. C. .
COMPUTER COMMUNICATIONS, 2019, 145 :113-125
[38]   A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption [J].
Malluhi, Qutaibah M. ;
Shikfa, Abdullatif ;
Viet Cuong Trinh .
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, :230-240
[39]  
Naor D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P41
[40]  
Rouselakis Y., 2013, P 2013 ACM SIGSAC C, P463