Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys

被引:0
|
作者
Delerablee, Cecile [1 ]
Paillier, Pascal [3 ]
Pointcheval, David [2 ]
机构
[1] France Telecom Div R&D, Paris, France
[2] ENS CNRS, F-75700 Paris, France
[3] Gemalto Secur Lab, Paris, France
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper puts forward new efficient constructions for public-key broadcast encryption that simultaneously enjoy the following properties: receivers are stateless; encryption is collusion-secure for arbitrarily large collusions of users and security is tight in the standard model; new users can join dynamically i.e. without modification of user decryption keys nor ciphertext size and little or no alteration of the encryption key. We also show how to permanently revoke any subgroup of users. Most importantly, our constructions achieve the optimal bound of O(1)-size either for ciphertexts or decryption keys, where the hidden constant relates to a couple of elements of a pairing-friendly group. Our broadcast-KEM trapdoor technique, which has independent interest, also provides a dynamic broadcast encryption system improving all previous efficiency measures (for both execution time and sizes) in the private-key setting.
引用
收藏
页码:39 / +
页数:4
相关论文
共 50 条
  • [21] Expressive Ciphertext-policy Attribute-based Encryption Scheme with Fast Decryption and Constant-size Secret Keys
    Li Long
    Gu Tianlong
    Chang Liang
    Xu Zhoubo
    Qian Junyan
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (07) : 1661 - 1668
  • [22] Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Attrapadung, Nuttapong
    Libert, Benoit
    de Panafieu, Elie
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 90 - +
  • [23] Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
    Susilo, Willy
    Yang, Guomin
    Guo, Fuchun
    Huang, Qiong
    INFORMATION SCIENCES, 2018, 429 : 349 - 360
  • [24] Multi-User Searchable Encryption Scheme With Constant-Size Keys
    Chang, YuJui
    Wu, JaLing
    2017 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2 2017), 2017, : 98 - 103
  • [25] Hierarchical Identity-Based Encryption with Constant-Size Private Keys
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    ETRI JOURNAL, 2012, 34 (01) : 142 - 145
  • [26] Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption
    Malluhi, Qutaibah
    Vinh Duc Tran
    Viet Cuong Trinh
    SYMMETRY-BASEL, 2020, 12 (06):
  • [28] Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
    Takashima, Katsuyuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 74 - 106
  • [29] Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment
    Odelu, Vanga
    Das, Ashok Kumar
    Rao, Y. Sreenivasa
    Kumari, Saru
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 3 - 9
  • [30] Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Zhang, Yinghui
    Zheng, Dong
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 259 - 273