Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

被引:35
|
作者
Wu, Qianhong [1 ,2 ,3 ]
Qin, Bo [4 ]
Zhang, Lei [5 ]
Domingo-Ferrer, Josep [6 ]
Farras, Oriol [6 ]
Manjon, Jesus A. [6 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100093, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Beijing 100093, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
[4] Renmin Univ China, Key Lab Data Engn & Knowledge Engn, Minist Educ, Sch Informat, ZhongGuanCun St 59, Beijing, Peoples R China
[5] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Inst Software Engn, Shanghai 200062, Peoples R China
[6] Univ Rovira & Virgili, Dept Comp Engn & Math, UNESCO Chair Data Privacy, E-43007 Tarragona, Spain
基金
北京市自然科学基金;
关键词
Broadcast encryption; group key agreement; contributory broadcast encryption; provable security; KEY MANAGEMENT SCHEME; AGREEMENT; SECURITY;
D O I
10.1109/TC.2015.2419662
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so that only the group members can decrypt the ciphertexts encrypted under the shared encryption key, but a sender cannot exclude any particular member from decrypting the ciphertexts. In this paper, we bridge these two notions with a hybrid primitive referred to as contributory broadcast encryption (ConBE). In this new primitive, a group of members negotiate a common public encryption key while each member holds a decryption key. A sender seeing the public group encryption key can limit the decryption to a subset of members of his choice. Following this model, we propose a ConBE scheme with short ciphertexts. The scheme is proven to be fully collusion-resistant under the decision n-Bilinear Diffie-Hellman Exponentiation (BDHE) assumption in the standard model. Of independent interest, we present a new BE scheme that is aggregatable. The aggregatability property is shown to be useful to construct advanced protocols.
引用
收藏
页码:466 / 479
页数:14
相关论文
共 50 条
  • [41] Ad Hoc Broadcast Encryption
    Wu, Qianhong
    Qin, Bo
    Zhang, Lei
    Domingo-Ferrer, Josep
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 741 - 743
  • [42] Security Notions for Broadcast Encryption
    Duong Hieu Phan
    Pointcheval, David
    Strefler, Mario
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 377 - 394
  • [43] Linear broadcast encryption schemes
    Padró, C
    Gracia, I
    Martín, S
    Morillo, P
    DISCRETE APPLIED MATHEMATICS, 2003, 128 (01) : 223 - 238
  • [44] Identity-based Threshold Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (03): : 400 - 410
  • [45] On The Security of YRL, An Anonymous Broadcast Encryption Scheme
    Rabaninejad, Reyhaneh
    Delavar, Mahshid
    Ameri, Mohammad Hassan
    Mohajeri, Javad
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 752 - 755
  • [46] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [47] Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
    Okamoto, Tatsuaki
    Takashima, Katsuyuki
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (2-3) : 725 - 771
  • [48] Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
    Tessaro, Stefano
    Wilson, David A.
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 257 - 274
  • [50] Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
    Libert, Benoit
    Paterson, Kenneth G.
    Quaglia, Elizabeth A.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 206 - 224