Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

被引:35
|
作者
Wu, Qianhong [1 ,2 ,3 ]
Qin, Bo [4 ]
Zhang, Lei [5 ]
Domingo-Ferrer, Josep [6 ]
Farras, Oriol [6 ]
Manjon, Jesus A. [6 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100093, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Beijing 100093, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
[4] Renmin Univ China, Key Lab Data Engn & Knowledge Engn, Minist Educ, Sch Informat, ZhongGuanCun St 59, Beijing, Peoples R China
[5] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Inst Software Engn, Shanghai 200062, Peoples R China
[6] Univ Rovira & Virgili, Dept Comp Engn & Math, UNESCO Chair Data Privacy, E-43007 Tarragona, Spain
基金
北京市自然科学基金;
关键词
Broadcast encryption; group key agreement; contributory broadcast encryption; provable security; KEY MANAGEMENT SCHEME; AGREEMENT; SECURITY;
D O I
10.1109/TC.2015.2419662
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so that only the group members can decrypt the ciphertexts encrypted under the shared encryption key, but a sender cannot exclude any particular member from decrypting the ciphertexts. In this paper, we bridge these two notions with a hybrid primitive referred to as contributory broadcast encryption (ConBE). In this new primitive, a group of members negotiate a common public encryption key while each member holds a decryption key. A sender seeing the public group encryption key can limit the decryption to a subset of members of his choice. Following this model, we propose a ConBE scheme with short ciphertexts. The scheme is proven to be fully collusion-resistant under the decision n-Bilinear Diffie-Hellman Exponentiation (BDHE) assumption in the standard model. Of independent interest, we present a new BE scheme that is aggregatable. The aggregatability property is shown to be useful to construct advanced protocols.
引用
收藏
页码:466 / 479
页数:14
相关论文
共 50 条
  • [31] COMPRESS MULTIPLE CIPHERTEXTS USING ELGAMAL ENCRYPTION SCHEMES
    Kim, Myungsun
    Kim, Jihye
    Cheon, Jung Hee
    JOURNAL OF THE KOREAN MATHEMATICAL SOCIETY, 2013, 50 (02) : 361 - 377
  • [32] Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption
    Zhou, Zhibin
    Huang, Dijiang
    Wang, Zhijie
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (01) : 126 - 138
  • [33] Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages
    Han, Jin Ho
    Park, Jong Hwan
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (04) : 796 - 806
  • [34] Towards secure and communication-efficient broadcast encryption systems
    Zhu, Wen Tao
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 178 - 186
  • [35] Efficient ID-based broadcast encryption scheme - Comments
    Chien, Hung-Yu
    IEEE TRANSACTIONS ON BROADCASTING, 2007, 53 (04) : 809 - 810
  • [36] (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard
    Barthoulot, Anais
    Blazy, Olivier
    Canard, Sebastien
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2022, 2022, 13641 : 143 - 164
  • [37] Towards Trusted Broadcast Encryption
    Cesena, Emanuele
    Ramunno, Gianluca
    Vernizzi, Davide
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2125 - +
  • [38] (Inner-Product) Functional Encryption with Updatable Ciphertexts
    Cini, Valerio
    Ramacher, Sebastian
    Slamanig, Daniel
    Striecks, Christoph
    Tairi, Erkan
    JOURNAL OF CRYPTOLOGY, 2024, 37 (01)
  • [39] Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
    Okamoto, Tatsuaki
    Takashima, Katsuyuki
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 138 - +
  • [40] Broadcast Searchable Keyword Encryption
    Ali, Mohamed Ali Hamza
    Zhong, Ting
    Li, Fagen
    Qin, Zhiguan
    Abdelrahaman, Ahmed A. A.
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1010 - 1016