Efficient and adaptively secure broadcast encryption systems

被引:10
|
作者
Zhang, Mingwu [1 ,2 ]
Yang, Bo [1 ,3 ]
Chen, Zhenhua [3 ]
Takagi, Tsuyoshi [2 ]
机构
[1] South China Agr Univ, Coll Informat, Guangzhou 510642, Guangdong, Peoples R China
[2] Kyushu Univ, Inst Math Ind, Fukuoka 8190395, Japan
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
基金
中国国家自然科学基金;
关键词
broadcast encryption; boundless receiver; adaptive security; dual-system encryption; IDENTITY-BASED ENCRYPTION; RANDOM ORACLES; SHORT CIPHERTEXTS; SCHEMES; HIBE;
D O I
10.1002/sec.678
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption is an effective way to broadcast a message securely such that more than one privileged receiver can decrypt it. The well-known constructions of identity-based broadcast encryption only support bounded broadcast users that had to deploy the maximum user number in advance. This is somewhat inefficient and impractical if the broadcast user number is predetermined. In this paper, we propose an adaptively secure identity-based broadcast encryption in the standard model that supports arbitrary number of users in broadcast set, which eliminates the size of public parameters with a constant number of group elements O(1) and obtain short ciphertexts, secret keys, and public parameters. We use the techniques of semi-functional ciphertexts and semi-functional keys in orthogonal subgroups to implement the boundless broadcast set and adaptive security by means of dual-system encryption mechanism in a composite-order group, and we prove the scheme to be fully secure without the random oracles in the static assumptions. The proposed scheme captures the properties of confidentiality, adaptive security, constant key, and short ciphertext. We also evaluate the computational costs and communication overheads and give the deployment in secure set-top box broadcast systems. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1044 / 1052
页数:9
相关论文
共 50 条
  • [41] Adaptively secure hierarchical identity-based encryption in the standard model
    Wu, Qing
    ICIC Express Letters, 2011, 5 (4 B): : 1321 - 1326
  • [42] New adaptively secure identity-based encryption over lattice
    Zhang, Leyou
    Wei, Jing
    ICIC Express Letters, Part B: Applications, 2015, 6 (10): : 2715 - 2721
  • [43] Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
    Datta, Pratish
    Okamoto, Tatsuaki
    Takashima, Katsuyuki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (07): : 1556 - 1597
  • [44] Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
    Kitagawa, Fuyuki
    Nishimaki, Ryo
    Tanaka, Keisuke
    Yamakawa, Takashi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 521 - 551
  • [45] Adaptively Secure Hierarchical Identity-Based Encryption over Lattice
    Zhang, Leyou
    Wu, Qing
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 46 - 58
  • [46] Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
    Choi, Seung Geol
    Dachman-Soled, Dana
    Malkin, Tal
    Wee, Hoeteck
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 287 - +
  • [47] Efficient One-Sided Adaptively Secure Computation
    Hazay, Carmit
    Patra, Arpita
    JOURNAL OF CRYPTOLOGY, 2017, 30 (01) : 321 - 371
  • [48] Efficient Adaptively Secure IBBE From the SXDH Assumption
    Ramanna, Somindu C.
    Sarkar, Palash
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (10) : 5709 - 5726
  • [49] Fully Secure Broadcast Encryption for Inner-Product Predicates
    Sun Jin
    Hu Yu-pu
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 316 - 320
  • [50] Secure and insecure modifications of the subset difference broadcast encryption scheme
    Asano, T
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 12 - 23