Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

被引:36
作者
Wu, Qianhong [1 ,2 ,3 ]
Qin, Bo [4 ]
Zhang, Lei [5 ]
Domingo-Ferrer, Josep [6 ]
Farras, Oriol [6 ]
Manjon, Jesus A. [6 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100093, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Beijing 100093, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
[4] Renmin Univ China, Key Lab Data Engn & Knowledge Engn, Minist Educ, Sch Informat, ZhongGuanCun St 59, Beijing, Peoples R China
[5] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Inst Software Engn, Shanghai 200062, Peoples R China
[6] Univ Rovira & Virgili, Dept Comp Engn & Math, UNESCO Chair Data Privacy, E-43007 Tarragona, Spain
基金
北京市自然科学基金;
关键词
Broadcast encryption; group key agreement; contributory broadcast encryption; provable security; KEY MANAGEMENT SCHEME; AGREEMENT; SECURITY;
D O I
10.1109/TC.2015.2419662
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so that only the group members can decrypt the ciphertexts encrypted under the shared encryption key, but a sender cannot exclude any particular member from decrypting the ciphertexts. In this paper, we bridge these two notions with a hybrid primitive referred to as contributory broadcast encryption (ConBE). In this new primitive, a group of members negotiate a common public encryption key while each member holds a decryption key. A sender seeing the public group encryption key can limit the decryption to a subset of members of his choice. Following this model, we propose a ConBE scheme with short ciphertexts. The scheme is proven to be fully collusion-resistant under the decision n-Bilinear Diffie-Hellman Exponentiation (BDHE) assumption in the standard model. Of independent interest, we present a new BE scheme that is aggregatable. The aggregatability property is shown to be useful to construct advanced protocols.
引用
收藏
页码:466 / 479
页数:14
相关论文
共 50 条
[21]   Authenticated Group Key Transfer Protocol Based on Secret Sharing [J].
Harn, Lein ;
Lin, Changlu .
IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (06) :842-846
[22]   A CONFERENCE KEY DISTRIBUTION-SYSTEM [J].
INGEMARSSON, I ;
TANG, DT ;
WONG, CK .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1982, 28 (05) :714-720
[23]   Flexible Robust Group Key Agreement [J].
Jarecki, Stanislaw ;
Kim, Jihye ;
Tsudik, Gene .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (05) :879-886
[24]   A one round protocol for tripartite Diffie-Hellman [J].
Joux, A .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :263-276
[25]  
Kim HJ, 2004, LECT NOTES COMPUT SC, V3329, P245
[26]  
Kim Y., 2004, ACM Transactions on Information and Systems Security, V7, P60, DOI 10.1145/984334.984337
[27]   Revocation Systems with Very Small Private Keys [J].
Lewko, Allison ;
Sahai, Amit ;
Waters, Brent .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :273-285
[28]  
Liu WR, 2014, LECT NOTES COMPUT SC, V8713, P91, DOI 10.1007/978-3-319-11212-1_6
[29]   Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks [J].
Liu, Zhihong ;
Ma, Jianfeng ;
Pei, Qingqi ;
Pang, Liaojun ;
Park, YoungHo .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (08) :2643-2653
[30]   JET: Dynamic join-exit-tree amortization and scheduling for contributory key management [J].
Mao, Yinian ;
Sun, Yan ;
Wu, Min ;
Liu, K. J. Ray .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2006, 14 (05) :1128-1140