Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys

被引:0
|
作者
Delerablee, Cecile [1 ]
Paillier, Pascal [3 ]
Pointcheval, David [2 ]
机构
[1] France Telecom Div R&D, Paris, France
[2] ENS CNRS, F-75700 Paris, France
[3] Gemalto Secur Lab, Paris, France
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper puts forward new efficient constructions for public-key broadcast encryption that simultaneously enjoy the following properties: receivers are stateless; encryption is collusion-secure for arbitrarily large collusions of users and security is tight in the standard model; new users can join dynamically i.e. without modification of user decryption keys nor ciphertext size and little or no alteration of the encryption key. We also show how to permanently revoke any subgroup of users. Most importantly, our constructions achieve the optimal bound of O(1)-size either for ciphertexts or decryption keys, where the hidden constant relates to a couple of elements of a pairing-friendly group. Our broadcast-KEM trapdoor technique, which has independent interest, also provides a dynamic broadcast encryption system improving all previous efficiency measures (for both execution time and sizes) in the private-key setting.
引用
收藏
页码:39 / +
页数:4
相关论文
共 50 条
  • [41] Continual auxiliary leakage-resilient attribute-based broadcast encryption with constant size ciphertexts
    Yujie S.
    Leyou Z.
    Xiaoxu G.
    Journal of China Universities of Posts and Telecommunications, 2020, 27 (04): : 69 - 82
  • [42] Attribute-based encryption with constant size ciphertexts
    Chen, Shao-Zhen
    Wang, Hai-Bin
    Tongxin Xuebao/Journal on Communications, 2011, 32 (11 A): : 190 - 195
  • [44] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang YANG Yupu HU Leyou ZHANG Chunhui SUN Department of Communication EngineeringXidian UniversityXian China Department of Mathematics and Computer ScienceFuzhou UniversityFuzhou China Department of Mathematics ScienceXidian UniversityXian China
    JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2011, 12 (10) : 819 - 827
  • [45] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang, Yang
    Hu, Yu-pu
    Zhang, Le-you
    Sun, Chun-hui
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2011, 12 (10): : 819 - 827
  • [46] Short lattice signatures with constant-size public keys
    Xie, Dong
    Peng, Haipeng
    Li, Lixiang
    Yang, Yixian
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5490 - 5501
  • [47] Continual auxiliary leakage-resilient attribute-based broadcast encryption with constant size ciphertexts
    Shang Yujie
    Zhang Leyou
    Gao Xiaoxu
    The Journal of China Universities of Posts and Telecommunications, 2020, 27 (04) : 69 - 82
  • [48] On the approach of fully public-keys to broadcast encryption
    Yang, Jun
    Zhou, Xianwei
    Sixth Wuhan International Conference on E-Business, Vols 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 1038 - 1044
  • [49] Efficient dynamic threshold identity-based encryption with constant-size ciphertext
    Susilo, Willy
    Guo, Fuchun
    Mu, Yi
    THEORETICAL COMPUTER SCIENCE, 2016, 609 : 49 - 59
  • [50] Threshold Attribute-based Signcryption with Constant-Size Ciphertexts and Public Verifiability
    Han Yiliang
    Lu Wanyi
    Yang Xiaoyuan
    2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, : 6373 - 6377