Authenticated public key broadcast encryption with short ciphertexts

被引:4
|
作者
Guo, Dianli [1 ,2 ]
Wen, Qiaoyan [1 ]
Jin, Zhengping [1 ]
Zhang, Hua [1 ]
Li, Wenmin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Natl Comp Syst Engn Res Inst China, Beijing 100083, Peoples R China
关键词
Broadcast encryption; Public key; Broadcaster authentication; Constant sized ciphertext; SECURE; SCHEME;
D O I
10.1007/s11042-019-7598-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption allows a broadcaster, who wants to distribute messages to a chosen subset of receivers, to produce an encrypted content and transmit it via a broadcast channel. Normally we think that it is preferable if the broadcast encryption system is a public-key cryptosystem, which permits anybody could encrypt and distribute messages with public parameters. Nevertheless, such a broadcast strategy brings along a slew of diffusions of the spam that are uncontrollable. Authenticated public key broadcast encryption ensures that no such strategy can succeed - the encryption algorithm creates ciphertext with public key and the broadcaster's secret key. It means that each broadcasted message is associated to the content distributor in order to ensure accountability. Technically, it embeds a signature in the ciphertext and each authorized users could verify it during decrypting. In this paper, we construct a solution for authenticated public key broadcast encryption using bilinear maps where the ciphertext is of O(1) (only constant number of group elements). The public key size and user private key are of size O(N) (N is the total number of users). The simulation experiment results indicated that the size of public key (private key) is about 4MB where we arbitrarily set N = 100000. Finally, we define the security for authenticated public key broadcast encryption and show that our construction captures static security in the standard model.
引用
收藏
页码:23399 / 23414
页数:16
相关论文
共 50 条
  • [31] New identity-based broadcast encryption with constant ciphertexts in the standard model
    Wu Q.
    Wang W.
    Journal of Software, 2011, 6 (10) : 1929 - 1936
  • [32] An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things
    Chi, Tianyu
    Qin, Baodong
    Zheng, Dong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [33] Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
    Duong-Hieu Phan
    David Pointcheval
    Siamak F. Shahandashti
    Mario Strefler
    International Journal of Information Security, 2013, 12 : 251 - 265
  • [34] Certificateless Public Key Authenticated Searchable Encryption With Enhanced Security Model in IIoT Applications
    Cheng, Leixiao
    Meng, Fei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02): : 1391 - 1400
  • [35] Public-key authenticated encryption with keyword search revisited: Security model and constructions
    Qin, Baodong
    Chen, Yu
    Huang, Qiong
    Liu, Ximeng
    Zheng, Dong
    INFORMATION SCIENCES, 2020, 516 : 515 - 528
  • [36] Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search
    Xu, Yongliang
    Cheng, Hang
    Li, Jiguo
    Liu, Ximeng
    Zhang, Xinpeng
    Wang, Meiqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3234 - 3246
  • [37] Public key broadcast encryption with low number of keys and constant decryption time
    Liu, Yi-Ru
    Tzeng, Wen-Guey
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 380 - 396
  • [38] Re-PAEKS: Public-Key Authenticated Re-Encryption With Keyword Search
    Luo, Fucai
    Wang, Haiyan
    Yan, Xingfu
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (10) : 10077 - 10092
  • [39] Public Key Authenticated Encryption With Designated Equality Test and Its Applications in Diagnostic Related Groups
    Wang, Yuanhao
    Huang, Qiong
    Li, Hongbo
    Huang, Jianye
    Yang, Guomin
    Susilo, Willy
    IEEE ACCESS, 2019, 7 : 135999 - 136011
  • [40] PAEWS: Public-Key Authenticated Encryption With Wildcard Search Over Outsourced Encrypted Data
    Luo, Fucai
    Yan, Xingfu
    Yang, Haining
    Zheng, Xiaofan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2212 - 2223