Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging

被引:8
作者
Mandal, Mriganka [1 ]
Nuida, Koji [1 ,2 ]
机构
[1] Univ Tokyo, Grad Sch Informat Sci & Technol, Tokyo, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
来源
NETWORK AND SYSTEM SECURITY, NSS 2020 | 2020年 / 12570卷
关键词
Broadcast encryption with personalized messages; Identity-based encryption; Privacy and anonymity;
D O I
10.1007/978-3-030-65745-1_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption (BE) is an effective method to broadcast encrypted confidential content, although it does not support the transmission of personalized messages to individuals. Broadcast encryption with personalized messages (BEPM) simultaneously transmits not only the common encrypted message to a group of users but also encrypted personalized messages to individual users. Currently available BEPM schemes fail to provide the recipient's anonymity that means the information of the subscriber set is available to the enemies. This paper first introduces a new BEPM paradigm, called identity-based outsider anonymous broadcast encryption with personalized messages (IB-OAnoBEPM), by tweaking the identity-based framework over the most advanced and secure asymmetric Type-3 variant of the bilinear maps. In addition to being adaptively secure, our construction withstands indistinguishable chosen-plaintext attack under the standard asymmetric decisional bilinear Diffie-Hellman exponent assumption without using the random oracle model. More positively, the proposed scheme is the first BEPM system that achieves security without any non-standard q-type assumptions. In particular, our design is very efficient both in terms of communication and computation costs, as the ciphertext size is constant, and the decryption algorithm requires only three asymmetric bilinear pairings to recover the correct message and the personalized messages, which are highly desirable for light-weight devices.
引用
收藏
页码:167 / 186
页数:20
相关论文
共 23 条
[1]   Provable Secure Constructions for Broadcast Encryption with Personalized Messages [J].
Acharya, Kamalesh ;
Dutta, Ratna .
PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 :329-348
[2]  
[Anonymous], 1994, ADV CRYPTOLOGY CRYPT, DOI DOI 10.1007/3-540-48329-2
[3]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3376, P87
[4]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[5]  
Boneh D., 2006, P ACM C COMPUTER COM, P211
[6]   Chosen-ciphertext security from identity-based encryption [J].
Canetti, R ;
Halevi, S ;
Katz, J .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 :207-222
[7]  
Chatterjee S, 2010, LECT NOTES COMPUT SC, V6087, P114, DOI 10.1007/978-3-642-13797-6_9
[8]   Anonymous Certificate-Based Broadcast Encryption With Personalized Messages [J].
Chen, Liqing ;
Li, Jiguo ;
Zhang, Yichen .
IEEE TRANSACTIONS ON BROADCASTING, 2020, 66 (04) :867-881
[9]  
Delerablée C, 2007, LECT NOTES COMPUT SC, V4833, P200
[10]  
Fazio N, 2012, LECT NOTES COMPUT SC, V7293, P225, DOI 10.1007/978-3-642-30057-8_14