Authenticated public key broadcast encryption with short ciphertexts

被引:4
|
作者
Guo, Dianli [1 ,2 ]
Wen, Qiaoyan [1 ]
Jin, Zhengping [1 ]
Zhang, Hua [1 ]
Li, Wenmin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Natl Comp Syst Engn Res Inst China, Beijing 100083, Peoples R China
关键词
Broadcast encryption; Public key; Broadcaster authentication; Constant sized ciphertext; SECURE; SCHEME;
D O I
10.1007/s11042-019-7598-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption allows a broadcaster, who wants to distribute messages to a chosen subset of receivers, to produce an encrypted content and transmit it via a broadcast channel. Normally we think that it is preferable if the broadcast encryption system is a public-key cryptosystem, which permits anybody could encrypt and distribute messages with public parameters. Nevertheless, such a broadcast strategy brings along a slew of diffusions of the spam that are uncontrollable. Authenticated public key broadcast encryption ensures that no such strategy can succeed - the encryption algorithm creates ciphertext with public key and the broadcaster's secret key. It means that each broadcasted message is associated to the content distributor in order to ensure accountability. Technically, it embeds a signature in the ciphertext and each authorized users could verify it during decrypting. In this paper, we construct a solution for authenticated public key broadcast encryption using bilinear maps where the ciphertext is of O(1) (only constant number of group elements). The public key size and user private key are of size O(N) (N is the total number of users). The simulation experiment results indicated that the size of public key (private key) is about 4MB where we arbitrarily set N = 100000. Finally, we define the security for authenticated public key broadcast encryption and show that our construction captures static security in the standard model.
引用
收藏
页码:23399 / 23414
页数:16
相关论文
共 50 条
  • [21] Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
    Kusakawa, Masafumi
    Hiwatari, Harunaga
    Asano, Tomoyuki
    Matsuda, Seiichi
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 31 - 48
  • [22] Authenticated public-key encryption based on elliptic curve
    Han, YL
    Yang, XY
    Hu, YP
    ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 424 - 431
  • [23] CASE: A New Frontier in Public-Key Authenticated Encryption
    Agrawal, Shashank
    Agrawal, Shweta
    Prabhakaran, Manoj
    Raghunath, Rajeev
    Singla, Jayesh
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT II, 2023, 14370 : 189 - 219
  • [24] On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes
    Baek, Joonsang
    Chu, Cheng-Kang
    Zhou, Jianying
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 302 - 318
  • [25] Public Key Authenticated Encryption with Keyword Search from LWE
    Cheng, Leixiao
    Meng, Fei
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 303 - 324
  • [26] Efficient public-key authenticated deniable encryption schemes
    Cao, Yanmei
    Wei, Jianghong
    Zhang, Fangguo
    Xiang, Yang
    Chen, Xiaofeng
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [27] Public key broadcast encryption schemes with shorter transmissions
    Park, Jong Hwan
    Kim, Hee Jean
    Sung, Maeng Hee
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON BROADCASTING, 2008, 54 (03) : 401 - 411
  • [28] Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts
    Daza, Vanesa
    Herranz, Javier
    Morillo, Paz
    Rafols, Carla
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 192 (02) : 3 - 15
  • [29] Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory
    Garg, Rachit
    Lu, George
    Waters, Brent
    Wu, David J.
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1093 - 1107
  • [30] Authenticated Encryption with Key Identification
    Len, Julia
    Grubbs, Paul
    Ristenpart, Thomas
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 181 - 209