Authenticated public key broadcast encryption with short ciphertexts

被引:4
|
作者
Guo, Dianli [1 ,2 ]
Wen, Qiaoyan [1 ]
Jin, Zhengping [1 ]
Zhang, Hua [1 ]
Li, Wenmin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Natl Comp Syst Engn Res Inst China, Beijing 100083, Peoples R China
关键词
Broadcast encryption; Public key; Broadcaster authentication; Constant sized ciphertext; SECURE; SCHEME;
D O I
10.1007/s11042-019-7598-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption allows a broadcaster, who wants to distribute messages to a chosen subset of receivers, to produce an encrypted content and transmit it via a broadcast channel. Normally we think that it is preferable if the broadcast encryption system is a public-key cryptosystem, which permits anybody could encrypt and distribute messages with public parameters. Nevertheless, such a broadcast strategy brings along a slew of diffusions of the spam that are uncontrollable. Authenticated public key broadcast encryption ensures that no such strategy can succeed - the encryption algorithm creates ciphertext with public key and the broadcaster's secret key. It means that each broadcasted message is associated to the content distributor in order to ensure accountability. Technically, it embeds a signature in the ciphertext and each authorized users could verify it during decrypting. In this paper, we construct a solution for authenticated public key broadcast encryption using bilinear maps where the ciphertext is of O(1) (only constant number of group elements). The public key size and user private key are of size O(N) (N is the total number of users). The simulation experiment results indicated that the size of public key (private key) is about 4MB where we arbitrarily set N = 100000. Finally, we define the security for authenticated public key broadcast encryption and show that our construction captures static security in the standard model.
引用
收藏
页码:23399 / 23414
页数:16
相关论文
共 50 条
  • [21] Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
    Phan, Duong-Hieu
    Pointcheval, David
    Shahandashti, Siamak F.
    Strefler, Mario
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (04) : 251 - 265
  • [22] Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
    Tessaro, Stefano
    Wilson, David A.
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 257 - 274
  • [23] Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
    Kim, Jihye
    Lee, Seunghwa
    Lee, Jiwon
    Oh, Hyunok
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1593 - 1600
  • [24] Security-enhanced public-key authenticated searchable encryption
    Cheng, Leixiao
    Qin, Jing
    Feng, Feng
    Meng, Fei
    INFORMATION SCIENCES, 2023, 647
  • [25] Public key authenticated searchable encryption against frequency analysis attacks
    Cheng, Leixiao
    Meng, Fei
    INFORMATION SCIENCES, 2023, 640
  • [26] Public-Key Authenticated Encryption with Keyword Search Without Pairings
    Yang N.
    Zhou Q.
    Xu S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2125 - 2135
  • [27] Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices
    Lu, Yang
    Li, Jiguo
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (12) : 4397 - 4409
  • [28] Adaptively secure broadcast encryption with authenticated content distributors
    Dianli Guo
    Qiaoyan Wen
    Wenmin Li
    Hua Zhang
    Zhengping Jin
    Multimedia Tools and Applications, 2020, 79 : 7889 - 7910
  • [29] Efficient All-or-Nothing Public Key Encryption With Authenticated Equality Test
    Zhao, Zhi-Yan
    Zeng, Peng
    IEEE ACCESS, 2021, 9 : 94099 - 94108
  • [30] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137