Security Notions for Broadcast Encryption

被引:0
|
作者
Duong Hieu Phan [1 ,2 ]
Pointcheval, David [2 ]
Strefler, Mario [2 ]
机构
[1] Univ Paris 08, LAGA, F-93526 St Denis 02, France
[2] CNRS, ENS, INRIA, F-75700 Paris, France
关键词
Broadcast Encryption; Adaptive Security; Security Models; CONSTANT-SIZE CIPHERTEXTS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper clarifies the relationships between security notions for broadcast encryption. In the past, each new scheme came with its own definition of security, which makes them hard to compare. We thus define a set of notions, as done for signature and encryption, for which we prove implications and separations, and relate the existing notions to the ones in our framework. We find some interesting relationships between the various notions, especially in the way they define the receiver set of the challenge message. In addition, we define a security notion that is stronger than all previous ones, and give an example of a scheme that fulfills this notion.
引用
收藏
页码:377 / 394
页数:18
相关论文
共 50 条
  • [31] Federated Cloud Computing Security using Forward-Secure Broadcast Encryption HIBE
    Rekaby, Fayza
    Abd El-Aziz, A. A.
    Mahmood, Mahmood A.
    Hefny, Hesham A.
    [J]. 2015 11TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2015, : 13 - 18
  • [32] An attribute-based anonymous broadcast encryption scheme with adaptive security in the standard model
    Rabaninejad, R.
    Ameri, M. H.
    Delavar, M.
    Mohajeri, J.
    [J]. SCIENTIA IRANICA, 2019, 26 (03) : 1700 - 1713
  • [33] Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security
    Xu, Peng
    Li, Jingnan
    Wang, Wei
    Jin, Hai
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 223 - 233
  • [34] On the Security Notions of Signcryption
    Hasegawa, Shingo
    Isobe, Shuji
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 231 - 235
  • [35] Towards Trusted Broadcast Encryption
    Cesena, Emanuele
    Ramunno, Gianluca
    Vernizzi, Davide
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2125 - +
  • [36] Ad Hoc Broadcast Encryption
    Wu, Qianhong
    Qin, Bo
    Zhang, Lei
    Domingo-Ferrer, Josep
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 741 - 743
  • [37] Fully threshold broadcast encryption
    Eskeland, Sigurd
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [38] The LSD broadcast encryption scheme
    Halevy, D
    Shamir, A
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 47 - 60
  • [39] Linear broadcast encryption schemes
    Padró, C
    Gracia, I
    Martín, S
    Morillo, P
    [J]. DISCRETE APPLIED MATHEMATICS, 2003, 128 (01) : 223 - 238
  • [40] Fully Distributed Broadcast Encryption
    Wu, Qianhong
    Qin, Bo
    Zhang, Lei
    Domingo-Ferrer, Josep
    [J]. PROVABLE SECURITY, 2011, 6980 : 102 - +