Authenticated public key broadcast encryption with short ciphertexts

被引:4
|
作者
Guo, Dianli [1 ,2 ]
Wen, Qiaoyan [1 ]
Jin, Zhengping [1 ]
Zhang, Hua [1 ]
Li, Wenmin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Natl Comp Syst Engn Res Inst China, Beijing 100083, Peoples R China
关键词
Broadcast encryption; Public key; Broadcaster authentication; Constant sized ciphertext; SECURE; SCHEME;
D O I
10.1007/s11042-019-7598-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption allows a broadcaster, who wants to distribute messages to a chosen subset of receivers, to produce an encrypted content and transmit it via a broadcast channel. Normally we think that it is preferable if the broadcast encryption system is a public-key cryptosystem, which permits anybody could encrypt and distribute messages with public parameters. Nevertheless, such a broadcast strategy brings along a slew of diffusions of the spam that are uncontrollable. Authenticated public key broadcast encryption ensures that no such strategy can succeed - the encryption algorithm creates ciphertext with public key and the broadcaster's secret key. It means that each broadcasted message is associated to the content distributor in order to ensure accountability. Technically, it embeds a signature in the ciphertext and each authorized users could verify it during decrypting. In this paper, we construct a solution for authenticated public key broadcast encryption using bilinear maps where the ciphertext is of O(1) (only constant number of group elements). The public key size and user private key are of size O(N) (N is the total number of users). The simulation experiment results indicated that the size of public key (private key) is about 4MB where we arbitrarily set N = 100000. Finally, we define the security for authenticated public key broadcast encryption and show that our construction captures static security in the standard model.
引用
收藏
页码:23399 / 23414
页数:16
相关论文
共 50 条
  • [41] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [42] Revocable Broadcast Encryption with Constant Ciphertext and Private Key Size
    Jia Hongyong
    Chen Yue
    Yang Kuiwu
    Guo Yuanbo
    Wang Zhiwei
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (04) : 690 - 697
  • [43] Secret-public storage trade-off for broadcast encryption key management
    Mihaljevic, MJ
    Fossorier, MPC
    Imai, H
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 375 - 387
  • [44] Tree based symmetric key broadcast encryption
    Bhattacherjee, Sanjay
    Sarkar, Palash
    JOURNAL OF DISCRETE ALGORITHMS, 2015, 34 : 78 - 107
  • [45] Key preassigned traceability schemes for broadcast encryption
    Stinson, DR
    Wei, R
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 144 - 156
  • [46] Public Key Encryption with Authorized Equality Test on Outsourced Ciphertexts for Cloud-Assisted IoT in Dual Server Model
    Zhao, Meng
    Ding, Yong
    Tang, Shijie
    Liang, Hai
    Wang, Huiyong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [47] Bridging Broadcast Encryption and Group Key Agreement
    Wu, Qianhong
    Qin, Bo
    Zhang, Lei
    Domingo-Ferrer, Josep
    Farras, Oriol
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 143 - +
  • [48] Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review
    Chan, Koon-Ming
    Heng, Swee-Huay
    Yau, Wei-Chuen
    Tan, Shing-Chiang
    IEEE ACCESS, 2022, 10 : 21584 - 21598
  • [49] Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability
    Pan, Xiangyu
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 115
  • [50] Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search
    Li, Hongbo
    Huang, Qiong
    Huang, Jianye
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 396 - 410