Security Notions for Broadcast Encryption

被引:0
|
作者
Duong Hieu Phan [1 ,2 ]
Pointcheval, David [2 ]
Strefler, Mario [2 ]
机构
[1] Univ Paris 08, LAGA, F-93526 St Denis 02, France
[2] CNRS, ENS, INRIA, F-75700 Paris, France
关键词
Broadcast Encryption; Adaptive Security; Security Models; CONSTANT-SIZE CIPHERTEXTS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper clarifies the relationships between security notions for broadcast encryption. In the past, each new scheme came with its own definition of security, which makes them hard to compare. We thus define a set of notions, as done for signature and encryption, for which we prove implications and separations, and relate the existing notions to the ones in our framework. We find some interesting relationships between the various notions, especially in the way they define the receiver set of the challenge message. In addition, we define a security notion that is stronger than all previous ones, and give an example of a scheme that fulfills this notion.
引用
收藏
页码:377 / 394
页数:18
相关论文
共 50 条
  • [1] Security notions for disk encryption
    Gjosteen, K
    [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 455 - 474
  • [2] On Security Notions for Encryption in a Quantum World
    Chevalier, Celine
    Ebrahimi, Ehsan
    Quoc-Huy Vu
    [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2022, 2022, 13774 : 592 - 613
  • [3] Adaptive Security of Broadcast Encryption, Revisited
    Zhu, Bingxin
    Wei, Puwen
    Wang, Mingqiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [4] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [5] Security weaknesses of certain broadcast encryption schemes
    Mihaljevic, Miodrag J.
    Fossorier, Marc P. C.
    Imai, Hideki
    [J]. DIGITAL RIGHTS MANAGEMENT: TECHNOLOGIES, ISSUES, CHALLENGES AND SYSTEMS, 2006, 3919 : 228 - 245
  • [6] Improved broadcast encryption schemes with enhanced security
    Ke, Lishan
    Yi, Zongxiang
    Ren, Yan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (01) : 121 - 129
  • [7] Efficient Anonymous Broadcast Encryption with Adaptive Security
    Zhou, Fu-Cai
    Lin, Mu-Qing
    Zhou, Yang
    Li, Yu-Xi
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (11): : 4680 - 4700
  • [8] On The Security of YRL, An Anonymous Broadcast Encryption Scheme
    Rabaninejad, Reyhaneh
    Delavar, Mahshid
    Ameri, Mohammad Hassan
    Mohajeri, Javad
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 752 - 755
  • [9] Improved broadcast encryption schemes with enhanced security
    Lishan Ke
    Zongxiang Yi
    Yan Ren
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 121 - 129
  • [10] Online encryption schemes: New security notions and constructions
    Boldyreva, A
    Taesombut, N
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 1 - 14