Adaptively secure broadcast encryption with authenticated content distributors

被引:0
|
作者
Dianli Guo
Qiaoyan Wen
Wenmin Li
Hua Zhang
Zhengping Jin
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[2] The 6th Research Institute of China Electronics Corporation,undefined
来源
关键词
Broadcast encryption; Adaptive security; Authenticated broadcaster; Composite order bilinear group;
D O I
暂无
中图分类号
学科分类号
摘要
In public key broadcast encryption systems, anyone could run the encryption algorithm to broadcast messages by using the public parameters. The unsupervised broadcast strategy allows malicious users (even though someone outside the system with the intentionally divulged public parameters) to distribute junk messages without responsibility. Consequently, content distributor authentication is essential for broadcast encryption systems to forbid spreading of junk information. In this work, we devise a solution for public key broadcast encryption system with adaptive security to resolve the aforementioned vicious broadcaster problem, which is neglected in the previous related works. In our scheme, any user could distribute an encryption of messages with both public parameters and his/her own secret keys, and each message is associated to its broadcaster. The construction is based on the composite order bilinear groups and its adaptive security depends on the hardness of the general subgroup decisional assumptions. Furthermore, this allows our scheme to be flexible in terms on the overhead of ciphertexts, which is constant sized. Compared with previous related broadcast encryption systems constructed in the composite order bilinear groups, our scheme inherits the superiority of adaptive security based non-interactive falsifiable assumption, and simultaneously achieves the optimal ciphertext overhead and the authentication of broadcasters.
引用
收藏
页码:7889 / 7910
页数:21
相关论文
共 50 条
  • [41] Provably secure certificateless deniable authenticated encryption scheme
    Kar, Jayaprakash
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [42] Some bounds and a construction for secure broadcast encryption
    Kurosawa, K
    Yoshida, T
    Desmedt, Y
    Burmester, M
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 420 - 433
  • [43] Secure and Efficient Construction of Broadcast Encryption with Dealership
    Acharya, Kamalesh
    Dutta, Ratna
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 277 - 295
  • [44] Adaptively secure identity-based encryption in the anonymous communication
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    ICIC Express Letters, 2011, 5 (9 A): : 3209 - 3215
  • [45] Secure channels based on authenticated encryption schemes: A simple characterization
    Namprempre, C
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 515 - 532
  • [46] Symmetric authentication codes with secrecy and unconditionally secure authenticated encryption
    McAven, L
    Safavi-Naini, R
    Yung, M
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 148 - 161
  • [47] TriviA and uTriviA: two fast and secure authenticated encryption schemes
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (01) : 29 - 48
  • [48] Provably secure convertible multi-authenticated encryption scheme
    Xie, Q.
    IET INFORMATION SECURITY, 2012, 6 (02) : 65 - 70
  • [49] SEAA: Secure and Efficient Authenticated Encryption Algorithm for Satellite Application
    Murtaza, Abid
    Pirzada, S. Jahanzeb Hussain
    Xu, Tongge
    Liu Jianwei
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (12): : 185 - 196
  • [50] Provable Secure Constructions for Broadcast Encryption with Personalized Messages
    Acharya, Kamalesh
    Dutta, Ratna
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 329 - 348