Adaptively secure broadcast encryption with authenticated content distributors

被引:0
|
作者
Dianli Guo
Qiaoyan Wen
Wenmin Li
Hua Zhang
Zhengping Jin
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[2] The 6th Research Institute of China Electronics Corporation,undefined
来源
关键词
Broadcast encryption; Adaptive security; Authenticated broadcaster; Composite order bilinear group;
D O I
暂无
中图分类号
学科分类号
摘要
In public key broadcast encryption systems, anyone could run the encryption algorithm to broadcast messages by using the public parameters. The unsupervised broadcast strategy allows malicious users (even though someone outside the system with the intentionally divulged public parameters) to distribute junk messages without responsibility. Consequently, content distributor authentication is essential for broadcast encryption systems to forbid spreading of junk information. In this work, we devise a solution for public key broadcast encryption system with adaptive security to resolve the aforementioned vicious broadcaster problem, which is neglected in the previous related works. In our scheme, any user could distribute an encryption of messages with both public parameters and his/her own secret keys, and each message is associated to its broadcaster. The construction is based on the composite order bilinear groups and its adaptive security depends on the hardness of the general subgroup decisional assumptions. Furthermore, this allows our scheme to be flexible in terms on the overhead of ciphertexts, which is constant sized. Compared with previous related broadcast encryption systems constructed in the composite order bilinear groups, our scheme inherits the superiority of adaptive security based non-interactive falsifiable assumption, and simultaneously achieves the optimal ciphertext overhead and the authentication of broadcasters.
引用
收藏
页码:7889 / 7910
页数:21
相关论文
共 50 条
  • [11] Authenticated public key broadcast encryption scheme secure against insiders' attack
    Park, Chanil
    Hur, Junbeom
    Hwang, Seongoun
    Yoon, Hyunsoo
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 113 - 122
  • [12] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Liqing Chen
    Jiguo Li
    Yichen Zhang
    Soft Computing, 2020, 24 : 4589 - 4606
  • [13] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    SOFT COMPUTING, 2020, 24 (06) : 4589 - 4606
  • [14] Unconditionally secure authenticated encryption
    Shikata, J
    Hanaoka, G
    Zheng, YL
    Matsumoto, T
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05): : 1119 - 1131
  • [15] Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext
    Kim, Jongkil
    Susilo, Willy
    Au, Man Ho
    Seberry, Jennifer
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 679 - 693
  • [16] Broadcast Authenticated Encryption with Keyword Search
    Liu, Xueqiao
    He, Kai
    Yang, Guomin
    Susilo, Willy
    Tonien, Joseph
    Huang, Qiong
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 193 - 213
  • [17] Adaptively Secure Identity-based Threshold Broadcast Encryption without Random Oracles
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 347 - +
  • [18] Completeness Theorems for Adaptively Secure Broadcast
    Cohen, Ran
    Garay, Juan
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT I, 2023, 14081 : 3 - 38
  • [19] Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
    Kusakawa, Masafumi
    Hiwatari, Harunaga
    Asano, Tomoyuki
    Matsuda, Seiichi
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 31 - 48
  • [20] Adaptively secure multi-authority attribute-based broadcast encryption in fog computing
    Chen, Jie
    Niu, Jiaxu
    Lei, Hao
    Lin, Li
    Ling, Yunhao
    COMPUTER NETWORKS, 2023, 232