Adaptively secure broadcast encryption with authenticated content distributors

被引:0
|
作者
Dianli Guo
Qiaoyan Wen
Wenmin Li
Hua Zhang
Zhengping Jin
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[2] The 6th Research Institute of China Electronics Corporation,undefined
来源
关键词
Broadcast encryption; Adaptive security; Authenticated broadcaster; Composite order bilinear group;
D O I
暂无
中图分类号
学科分类号
摘要
In public key broadcast encryption systems, anyone could run the encryption algorithm to broadcast messages by using the public parameters. The unsupervised broadcast strategy allows malicious users (even though someone outside the system with the intentionally divulged public parameters) to distribute junk messages without responsibility. Consequently, content distributor authentication is essential for broadcast encryption systems to forbid spreading of junk information. In this work, we devise a solution for public key broadcast encryption system with adaptive security to resolve the aforementioned vicious broadcaster problem, which is neglected in the previous related works. In our scheme, any user could distribute an encryption of messages with both public parameters and his/her own secret keys, and each message is associated to its broadcaster. The construction is based on the composite order bilinear groups and its adaptive security depends on the hardness of the general subgroup decisional assumptions. Furthermore, this allows our scheme to be flexible in terms on the overhead of ciphertexts, which is constant sized. Compared with previous related broadcast encryption systems constructed in the composite order bilinear groups, our scheme inherits the superiority of adaptive security based non-interactive falsifiable assumption, and simultaneously achieves the optimal ciphertext overhead and the authentication of broadcasters.
引用
收藏
页码:7889 / 7910
页数:21
相关论文
共 50 条
  • [21] Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
    Chen, Liqing
    Li, Jiguo
    Lu, Yang
    Zhang, Yichen
    INFORMATION SCIENCES, 2020, 538 : 273 - 289
  • [22] Secure Fully Homomorphic Authenticated Encryption
    Kim, Jeongsu
    Yun, Aaram
    IEEE ACCESS, 2021, 9 : 107279 - 107297
  • [23] An Adaptively Secure Functional Encryption for Randomized Functions
    Liu, Muhua
    Zhang, Ping
    COMPUTER JOURNAL, 2020, 63 (08): : 1247 - 1258
  • [24] Authenticated public key broadcast encryption with short ciphertexts
    Dianli Guo
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    Wenmin Li
    Multimedia Tools and Applications, 2019, 78 : 23399 - 23414
  • [25] A secure authenticated encryption scheme and its extension
    Zhang, Jianhong
    Cheng, Ji
    PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 74 - 78
  • [26] Unconditionally Secure Authenticated Encryption with Shorter Keys
    Alomair, Basel
    Poovendran, Radha
    SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 3 - 15
  • [27] Authenticated public key broadcast encryption with short ciphertexts
    Guo, Dianli
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    Li, Wenmin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (16) : 23399 - 23414
  • [28] Secure remote storage through authenticated encryption
    Hou, Fangyong
    Gu, Dawu
    Xiao, Nong
    Tang, Yuhua
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 3 - +
  • [29] TriviA: A Fast and Secure Authenticated Encryption Scheme
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 330 - 353
  • [30] Secure Disk with Authenticated Encryption and IV Verification
    Hou, Fangyong
    Xiao, Nong
    Liu, Fang
    He, Hongjun
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44