An attribute-based anonymous broadcast encryption scheme with adaptive security in the standard model

被引:4
作者
Rabaninejad, R. [1 ]
Ameri, M. H. [2 ]
Delavar, M. [2 ]
Mohajeri, J. [2 ]
机构
[1] KN Toosi Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
关键词
Broadcast encryption; Ciphertext-Policy Attribute-Based Encryption (CP-ABE); Access structure; Anonymity; Provable security; Attack;
D O I
10.24200/sci.2017.4517
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In broadcast encryption schemes, a distribution center broadcasts an encrypted message to a subset chosen from a universe of receivers, and only the intended users are able to decrypt the message. Most broadcast encryption schemes do not provide anonymity, and the identities of target receivers are sent in plaintext. However, in several applications, the authorized user's identities have the same sensitivity as the broadcasted messages. Yu, Ren, and Lou (YRL) [Yu, S., Ren, K., and Lou, W. "Attribute-based on-demand multicast group setup with membership anonymity", Computer Networks, 54(3), pp. 377-386 (2010).] considered this issue and introduced an efficient anonymous attribute-based broadcast encryption scheme. This paper first proposed an attack on the YRL scheme, and showed that the unauthorized receivers could also decrypt the broadcasted message. Next, we proposed the Improved-YRL scheme and proved that it achieved anonymity and semantic security under adaptive corruptions in the chosen ciphertext setting. The proof is provided by the dual system encryption technique and is based on three complexity assumptions in composite order bilinear maps. The Improved-YRL scheme is a step forward in solving the long-standing problem of secure and low overhead anonymous broadcast encryption. (C) 2019 Sharif University of Technology. All rights reserved.
引用
收藏
页码:1700 / 1713
页数:14
相关论文
共 23 条
  • [1] Aljawarneh Shadi, 2011, Network Security, V2011, P12, DOI 10.1016/S1353-4858(11)70026-5
  • [2] A resource-efficient encryption algorithm for multimedia big data
    Aljawarneh, Shadi
    Yassein, Muneer Bani
    Talafha, We'am Adel
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (21) : 22703 - 22724
  • [3] Cloud security engineering: Early stages of SDLC
    Aljawarneh, Shadi A.
    Alawneh, Ali
    Jaradat, Reern
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 74 : 385 - 392
  • [4] Barth A, 2006, LECT NOTES COMPUT SC, V4107, P52
  • [5] Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
  • [6] Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
  • [7] Boneh D., 2006, P ACM C COMPUTER COM, P211
  • [8] Boneh D, 2014, LECT NOTES COMPUT SC, V8616, P206, DOI 10.1007/978-3-662-44371-2_12
  • [9] Fazio N, 2012, LECT NOTES COMPUT SC, V7293, P225, DOI 10.1007/978-3-642-30057-8_14
  • [10] Fiat A., 1993, LNCS, P480, DOI [DOI 10.1007/3-540-48329-240, DOI 10.1007/3-540-48329-2]