Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

被引:35
|
作者
Wu, Qianhong [1 ,2 ,3 ]
Qin, Bo [4 ]
Zhang, Lei [5 ]
Domingo-Ferrer, Josep [6 ]
Farras, Oriol [6 ]
Manjon, Jesus A. [6 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100093, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Beijing 100093, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
[4] Renmin Univ China, Key Lab Data Engn & Knowledge Engn, Minist Educ, Sch Informat, ZhongGuanCun St 59, Beijing, Peoples R China
[5] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Inst Software Engn, Shanghai 200062, Peoples R China
[6] Univ Rovira & Virgili, Dept Comp Engn & Math, UNESCO Chair Data Privacy, E-43007 Tarragona, Spain
基金
北京市自然科学基金;
关键词
Broadcast encryption; group key agreement; contributory broadcast encryption; provable security; KEY MANAGEMENT SCHEME; AGREEMENT; SECURITY;
D O I
10.1109/TC.2015.2419662
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so that only the group members can decrypt the ciphertexts encrypted under the shared encryption key, but a sender cannot exclude any particular member from decrypting the ciphertexts. In this paper, we bridge these two notions with a hybrid primitive referred to as contributory broadcast encryption (ConBE). In this new primitive, a group of members negotiate a common public encryption key while each member holds a decryption key. A sender seeing the public group encryption key can limit the decryption to a subset of members of his choice. Following this model, we propose a ConBE scheme with short ciphertexts. The scheme is proven to be fully collusion-resistant under the decision n-Bilinear Diffie-Hellman Exponentiation (BDHE) assumption in the standard model. Of independent interest, we present a new BE scheme that is aggregatable. The aggregatability property is shown to be useful to construct advanced protocols.
引用
收藏
页码:466 / 479
页数:14
相关论文
共 50 条
  • [1] Authenticated public key broadcast encryption with short ciphertexts
    Guo, Dianli
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    Li, Wenmin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (16) : 23399 - 23414
  • [2] Authenticated public key broadcast encryption with short ciphertexts
    Dianli Guo
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    Wenmin Li
    Multimedia Tools and Applications, 2019, 78 : 23399 - 23414
  • [3] Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
    Gentry, Craig
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 171 - +
  • [4] Collusion resistant broadcast encryption with short ciphertexts and private keys
    Boneh, D
    Gentry, C
    Waters, B
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 258 - 275
  • [5] Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
    Gay, Romain
    Kowalczyk, Lucas
    Wee, Hoeteck
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 123 - 139
  • [6] Adaptively Secure Broadcast Encryption With Constant Ciphertexts
    Guo, Dianli
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    IEEE TRANSACTIONS ON BROADCASTING, 2016, 62 (03) : 709 - 715
  • [7] Forward-secure and searchable broadcast encryption with short ciphertexts and private keys
    Attrapadung, Nuttapong
    Furukawa, Jun
    Imai, Hideki
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 161 - +
  • [8] Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
    Fazio, Nelly
    Perera, Irippuge Milinda
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 225 - 242
  • [9] Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts
    Daza, Vanesa
    Herranz, Javier
    Morillo, Paz
    Rafols, Carla
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 192 (02) : 3 - 15
  • [10] Efficient ID-based multi-decrypter encryption with short ciphertexts
    Chai, Zhen-Chuan
    Cao, Zhen-Fu
    Zhou, Yuan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 103 - 108