Adaptively secure broadcast encryption with authenticated content distributors

被引:0
|
作者
Dianli Guo
Qiaoyan Wen
Wenmin Li
Hua Zhang
Zhengping Jin
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[2] The 6th Research Institute of China Electronics Corporation,undefined
来源
关键词
Broadcast encryption; Adaptive security; Authenticated broadcaster; Composite order bilinear group;
D O I
暂无
中图分类号
学科分类号
摘要
In public key broadcast encryption systems, anyone could run the encryption algorithm to broadcast messages by using the public parameters. The unsupervised broadcast strategy allows malicious users (even though someone outside the system with the intentionally divulged public parameters) to distribute junk messages without responsibility. Consequently, content distributor authentication is essential for broadcast encryption systems to forbid spreading of junk information. In this work, we devise a solution for public key broadcast encryption system with adaptive security to resolve the aforementioned vicious broadcaster problem, which is neglected in the previous related works. In our scheme, any user could distribute an encryption of messages with both public parameters and his/her own secret keys, and each message is associated to its broadcaster. The construction is based on the composite order bilinear groups and its adaptive security depends on the hardness of the general subgroup decisional assumptions. Furthermore, this allows our scheme to be flexible in terms on the overhead of ciphertexts, which is constant sized. Compared with previous related broadcast encryption systems constructed in the composite order bilinear groups, our scheme inherits the superiority of adaptive security based non-interactive falsifiable assumption, and simultaneously achieves the optimal ciphertext overhead and the authentication of broadcasters.
引用
收藏
页码:7889 / 7910
页数:21
相关论文
共 50 条
  • [31] Secure Content Sharing using Third Party with Broadcast Encryption for Stateless Receivers
    Chourishi 'Maitraya', Dharmendra
    Seshadri, Sridevi
    Chourishi, Dhruvendra
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 528 - +
  • [32] Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 12 - 18
  • [33] Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (03): : 1523 - 1545
  • [34] Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
    Katz, Jonathan
    Thiruvengadam, Aishwarya
    Zhou, Hong-Sheng
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 14 - 31
  • [35] A Punctured Programming Approach to Adaptively Secure Functional Encryption
    Waters, Brent
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 678 - 697
  • [36] Adaptively Secure Threshold Symmetric-Key Encryption
    Mukherjee, Pratyay
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 465 - 487
  • [37] QCB: Efficient Quantum-Secure Authenticated Encryption
    Bhaumik, Ritam
    Bonnetain, Xavier
    Chailloux, Andre
    Leurent, Gaetan
    Naya-Plasencia, Maria
    Schrottenloher, Andre
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 668 - 698
  • [38] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [39] Artemia: A Family of Provably Secure Authenticated Encryption Schemes
    Alizadeh, Javad
    Aref, Mohammad Reza
    Bagheri, Nasour
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (02): : 125 - 139
  • [40] An Authenticated Encryption Mechanism for Secure Group Communication in Grid
    Li, Yunfa
    Jin, Hai
    Zou, Deqing
    Liu, Sanmin
    Han, Zongfen
    ICICSE: 2008 INTERNATIONAL CONFERENCE ON INTERNET COMPUTING IN SCIENCE AND ENGINEERING, PROCEEDINGS, 2008, : 298 - +