Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys

被引:0
|
作者
Delerablee, Cecile [1 ]
Paillier, Pascal [3 ]
Pointcheval, David [2 ]
机构
[1] France Telecom Div R&D, Paris, France
[2] ENS CNRS, F-75700 Paris, France
[3] Gemalto Secur Lab, Paris, France
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper puts forward new efficient constructions for public-key broadcast encryption that simultaneously enjoy the following properties: receivers are stateless; encryption is collusion-secure for arbitrarily large collusions of users and security is tight in the standard model; new users can join dynamically i.e. without modification of user decryption keys nor ciphertext size and little or no alteration of the encryption key. We also show how to permanently revoke any subgroup of users. Most importantly, our constructions achieve the optimal bound of O(1)-size either for ciphertexts or decryption keys, where the hidden constant relates to a couple of elements of a pairing-friendly group. Our broadcast-KEM trapdoor technique, which has independent interest, also provides a dynamic broadcast encryption system improving all previous efficiency measures (for both execution time and sizes) in the private-key setting.
引用
收藏
页码:39 / +
页数:4
相关论文
共 50 条
  • [31] Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
    Attrapadung, Nuttapong
    Libert, Benoit
    PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 384 - 402
  • [32] Expressive CP-ABE Scheme for Mobile Devices in loT Satisfying Constant-Size Keys and Ciphertexts
    Odelu, Vanga
    Das, Ashok Kumar
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    Jo, Minho
    IEEE ACCESS, 2017, 5 : 3273 - 3283
  • [33] Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsorced Verifiable Computation
    Zhang, Kai
    Gong, Junqing
    Tang, Shaohua
    Chen, Jie
    Li, Xiangxue
    Qian, Haifeng
    Cao, Zhenfu
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 269 - 279
  • [34] Fully collusion resistant traitor tracing with short ciphertexts and private keys
    Boneh, Dan
    Sahai, Amit
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 573 - 592
  • [35] Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
    Zhang, Xiao
    Wu, Faguo
    Yao, Wang
    Wang, Zhao
    Wang, Wenhua
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
  • [36] Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
    Liang, Kaitai
    Chu, Cheng-Kang
    Tan, Xiao
    Wong, Duncan S.
    Tang, Chunming
    Zhou, Jianying
    THEORETICAL COMPUTER SCIENCE, 2014, 539 : 87 - 105
  • [37] Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption
    Canard, Sebastien
    Viet Cuong Trinh
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 193 - 211
  • [38] Fully collusion resistant black-box traitor revocable broadcast encryption with short private keys
    Furukawa, Jun
    Attrapadung, Nuttapong
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2007, 4596 : 496 - 508
  • [39] CCA2-secure threshold broadcast encryption with shorter ciphertexts
    Daza, Vanesa
    Herranz, Javier
    Morillo, Paz
    Rafols, Carla
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 35 - +
  • [40] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang Yang
    Yu-pu Hu
    Le-you Zhang
    Chun-hui Sun
    Journal of Zhejiang University SCIENCE C, 2011, 12 : 819 - 827