Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

被引:35
|
作者
Wu, Qianhong [1 ,2 ,3 ]
Qin, Bo [4 ]
Zhang, Lei [5 ]
Domingo-Ferrer, Josep [6 ]
Farras, Oriol [6 ]
Manjon, Jesus A. [6 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100093, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Beijing 100093, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
[4] Renmin Univ China, Key Lab Data Engn & Knowledge Engn, Minist Educ, Sch Informat, ZhongGuanCun St 59, Beijing, Peoples R China
[5] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Inst Software Engn, Shanghai 200062, Peoples R China
[6] Univ Rovira & Virgili, Dept Comp Engn & Math, UNESCO Chair Data Privacy, E-43007 Tarragona, Spain
基金
北京市自然科学基金;
关键词
Broadcast encryption; group key agreement; contributory broadcast encryption; provable security; KEY MANAGEMENT SCHEME; AGREEMENT; SECURITY;
D O I
10.1109/TC.2015.2419662
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so that only the group members can decrypt the ciphertexts encrypted under the shared encryption key, but a sender cannot exclude any particular member from decrypting the ciphertexts. In this paper, we bridge these two notions with a hybrid primitive referred to as contributory broadcast encryption (ConBE). In this new primitive, a group of members negotiate a common public encryption key while each member holds a decryption key. A sender seeing the public group encryption key can limit the decryption to a subset of members of his choice. Following this model, we propose a ConBE scheme with short ciphertexts. The scheme is proven to be fully collusion-resistant under the decision n-Bilinear Diffie-Hellman Exponentiation (BDHE) assumption in the standard model. Of independent interest, we present a new BE scheme that is aggregatable. The aggregatability property is shown to be useful to construct advanced protocols.
引用
收藏
页码:466 / 479
页数:14
相关论文
共 50 条
  • [21] Efficient broadcast encryption with user profiles
    Ak, Murat
    Kaya, Kamer
    Onarlioglu, Kaan
    Selcuk, Ali Aydin
    INFORMATION SCIENCES, 2010, 180 (06) : 1060 - 1072
  • [22] Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
    Phan, Duong-Hieu
    Pointcheval, David
    Shahandashti, Siamak F.
    Strefler, Mario
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (04) : 251 - 265
  • [23] Identity-based broadcast encryption with constant size ciphertexts and private keys
    Delerablee, Cecile
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 200 - 215
  • [24] Witness encryption with updatable ciphertexts
    Yuzhu WANG
    Mingwu ZHANG
    Science China(Information Sciences), 2025, 68 (03) : 181 - 196
  • [25] Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
    Duong-Hieu Phan
    David Pointcheval
    Siamak F. Shahandashti
    Mario Strefler
    International Journal of Information Security, 2013, 12 : 251 - 265
  • [26] On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
    Zhou, Zhibin
    Huang, Dijiang
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 753 - 755
  • [27] Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Domingo-Ferrer, Josep
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 62 - 76
  • [28] Efficient Anonymous Broadcast Encryption with Adaptive Security
    Zhou, Fu-Cai
    Lin, Mu-Qing
    Zhou, Yang
    Li, Yu-Xi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (11): : 4680 - 4700
  • [29] Efficient and adaptively secure broadcast encryption systems
    Zhang, Mingwu
    Yang, Bo
    Chen, Zhenhua
    Takagi, Tsuyoshi
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 1044 - 1052
  • [30] Secure and Efficient Construction of Broadcast Encryption with Dealership
    Acharya, Kamalesh
    Dutta, Ratna
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 277 - 295