Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security

被引:15
|
作者
Xu, Peng [1 ]
Li, Jingnan [1 ]
Wang, Wei [2 ]
Jin, Hai [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Big Data Technol & Syst Lab, Cluster & Grid Comp Lab,Serv Comp Technol & Syst, Wuhan 430071, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Cyber Phys Social Syst Lab, Wuhan 430071, Peoples R China
关键词
Anonymous Identity-Based Broadcast Encryption; Constant Decryption Complexity; Adaptive Attack; Standard Model; Random Oracle Model;
D O I
10.1145/2897845.2897853
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymous Identity-Based Broadcast Encryption (AIBBE) allows a sender to broadcast a ciphertext to multi-receivers, and keeps receivers' anonymity. The existing AIBBE schemes fail to achieve efficient decryption or strong security, like the constant decryption complexity, the security under the adaptive attack, or the security in the standard model. Hence, we propose two new AIBBE schemes to overcome the drawbacks of previous schemes in the state-of-art. The biggest contribution in our work is the proposed AIBBE scheme with constant decryption complexity and the provable security under the adaptive attack in the standard model. This scheme should be the first one to obtain advantages in all above mentioned aspects, and has sufficient contribution in theory due to its strong security. We also propose another AIBBE scheme in the Random Oracle (RO) model, which is of sufficient interest in practice due to our experiment.
引用
收藏
页码:223 / 233
页数:11
相关论文
共 50 条
  • [1] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255
  • [2] Anonymous certificate-based broadcast encryption with constant decryption cost
    Li, Jiguo
    Chen, Liqing
    Lu, Yang
    Zhang, Yichen
    [J]. INFORMATION SCIENCES, 2018, 454 : 110 - 127
  • [3] Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing
    Kim, Jongkil
    Camtepe, Seyit
    Susilo, Willy
    Nepal, Surya
    Baek, Joonsang
    [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 55 - 66
  • [4] Anonymous hierarchical identity-based encryption without key delegation in decryption
    Luo, Song
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 306 - 317
  • [5] Cryptanalysis of RNZ, an identity-based fully anonymous broadcast encryption
    Mandal, Mriganka
    [J]. ICT EXPRESS, 2020, 6 (04): : 316 - 319
  • [6] Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 215 - +
  • [7] Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging
    Mandal, Mriganka
    Nuida, Koji
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2020, 2020, 12570 : 167 - 186
  • [8] Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles
    Xie Li
    Ren Yanli
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (02) : 40 - 51
  • [9] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [10] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375