Adaptively secure broadcast encryption with authenticated content distributors

被引:0
|
作者
Dianli Guo
Qiaoyan Wen
Wenmin Li
Hua Zhang
Zhengping Jin
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[2] The 6th Research Institute of China Electronics Corporation,undefined
来源
关键词
Broadcast encryption; Adaptive security; Authenticated broadcaster; Composite order bilinear group;
D O I
暂无
中图分类号
学科分类号
摘要
In public key broadcast encryption systems, anyone could run the encryption algorithm to broadcast messages by using the public parameters. The unsupervised broadcast strategy allows malicious users (even though someone outside the system with the intentionally divulged public parameters) to distribute junk messages without responsibility. Consequently, content distributor authentication is essential for broadcast encryption systems to forbid spreading of junk information. In this work, we devise a solution for public key broadcast encryption system with adaptive security to resolve the aforementioned vicious broadcaster problem, which is neglected in the previous related works. In our scheme, any user could distribute an encryption of messages with both public parameters and his/her own secret keys, and each message is associated to its broadcaster. The construction is based on the composite order bilinear groups and its adaptive security depends on the hardness of the general subgroup decisional assumptions. Furthermore, this allows our scheme to be flexible in terms on the overhead of ciphertexts, which is constant sized. Compared with previous related broadcast encryption systems constructed in the composite order bilinear groups, our scheme inherits the superiority of adaptive security based non-interactive falsifiable assumption, and simultaneously achieves the optimal ciphertext overhead and the authentication of broadcasters.
引用
收藏
页码:7889 / 7910
页数:21
相关论文
共 50 条
  • [1] Adaptively secure broadcast encryption with authenticated content distributors
    Guo, Dianli
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7889 - 7910
  • [2] Adaptively Secure Broadcast Encryption with Dealership
    Acharya, Kamalesh
    Dutta, Ratna
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 161 - 177
  • [3] Efficient and adaptively secure broadcast encryption systems
    Zhang, Mingwu
    Yang, Bo
    Chen, Zhenhua
    Takagi, Tsuyoshi
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 1044 - 1052
  • [4] Adaptively Secure Broadcast Encryption With Constant Ciphertexts
    Guo, Dianli
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    IEEE TRANSACTIONS ON BROADCASTING, 2016, 62 (03) : 709 - 715
  • [5] Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
    Gay, Romain
    Kowalczyk, Lucas
    Wee, Hoeteck
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 123 - 139
  • [6] Adaptively Secure Broadcast
    Hirt, Martin
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 466 - 485
  • [7] Adaptively secure broadcast encryption under standard assumptions with better efficiency
    Lee, Kwangsu
    Lee, Dong Hoon
    IET INFORMATION SECURITY, 2015, 9 (03) : 149 - 157
  • [8] Authenticated secure group communication using broadcast encryption key computation
    Aparna, R.
    Amberker, B. B.
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 348 - +
  • [9] Adaptively Secure Broadcast, Revisited
    Garay, Juan A.
    Katz, Jonathan
    Kumaresan, Ranjit
    Zhou, Hong-Sheng
    PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 179 - 186
  • [10] Identity-based authenticated broadcast encryption and distributed authenticated encryption
    Mu, Y
    Susilo, W
    Lin, YX
    Ruan, C
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 169 - 181