Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys

被引:10
作者
Gay, Romain [1 ,2 ]
Kowalczyk, Lucas [3 ]
Wee, Hoeteck [1 ,2 ]
机构
[1] PSL Univ, CNRS, Ecole Normale Super, DIENS, F-75005 Paris, France
[2] INRIA, Paris, France
[3] Columbia Univ, New York, NY 10027 USA
来源
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018 | 2018年 / 11035卷
基金
欧盟地平线“2020”;
关键词
DUAL SYSTEM ENCRYPTION; ORDER GROUPS; SIGNATURES; HIBE; IBE;
D O I
10.1007/978-3-319-98113-0_7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a new public key broadcast encryption scheme where both the ciphertext and secret keys consist of a constant number of group elements. Our result improves upon the work of Boneh, Gentry and Waters (Crypto'05) as well as several recent follow-ups (TCC'16A, Asiacrypt'16) in two ways: (i) we achieve adaptive security instead of selective security, and (ii) our construction relies on the decisional k-Linear Assumption in prime-order groups (as opposed to q-type assumptions or subgroup decisional assumptions in composite-order groups); our improvements come at the cost of a larger public key. Finally, we show that our scheme achieves adaptive security in the multi-ciphertext setting with a security loss that is independent of the number of challenge ciphertexts.
引用
收藏
页码:123 / 139
页数:17
相关论文
共 44 条
[1]   A Study of Pair Encodings: Predicate Encryption in Prime Order Groups [J].
Agrawal, Shashank ;
Chase, Melissa .
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 :259-288
[2]  
[Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
[3]   Comparing the pairing efficiency over composite-order and prime-order elliptic curves [J].
Guillevic, Aurore .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7954 LNCS :357-372
[4]  
[Anonymous], IACR CRYPTOLOGY EPRI
[5]  
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[6]  
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[7]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P259
[8]  
Blazy O, 2014, LECT NOTES COMPUT SC, V8616, P408, DOI 10.1007/978-3-662-44371-2_23
[9]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[10]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456