Bridging Broadcast Encryption and Group Key Agreement

被引:0
|
作者
Wu, Qianhong [1 ,2 ]
Qin, Bo [1 ,3 ]
Zhang, Lei [4 ]
Domingo-Ferrer, Josep [1 ]
Farras, Oriol [1 ,5 ]
机构
[1] Univ Rovira & Virgili, Dept Comp Engn & Math, UNESCO Chair Data Privacy, Tarragona, Catalonia, Spain
[2] Wuhan Univ, Minist Educ Sch Comp, Key Lab Aeros Informat Security & Trusted Comp, Wuhan, Peoples R China
[3] Xian Univ Tech, Dept Math, Sch Sci, Xian, Peoples R China
[4] East China Normal Univ, Inst Software Engn, Shanghai, Peoples R China
[5] Ben Gurion Univ Negev, Dept Comp Sci, IL-84105 Beer Sheva, Israel
来源
关键词
Broadcast encryption; Group key agreement; Contributory broadcast encryption; Provable Security; SHORT CIPHERTEXTS; EXCHANGE; SCHEMES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but requires a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so that only the members can decrypt the ciphertexts encrypted under the shared encryption key, but a sender cannot exclude any particular member from decrypting the ciphertexts. In this paper, we bridge these two notions with a hybrid primitive referred to as contributory broadcast encryption (CBE). In this new primitive, a group of members negotiate a common public encryption key while each member holds a decryption key. A sender seeing the public group encryption key can limit the decryption to a subset of members of his choice. Following this model, we propose a CBE scheme with short ciphertexts. The scheme is proven to be fully collusion-resistant under the decision n-Bilinear Diffie-Hellman Exponentiation (BDHE) assumption in the standard model. We also illustrate a variant in which the communication and computation complexity is sub-linear with the group size. Of independent interest, we present a new BE scheme that is aggregatable. The aggregatability property is shown to be useful to construct advanced protocols.
引用
收藏
页码:143 / +
页数:3
相关论文
共 50 条
  • [1] PROFICIENT KEY MANAGEMENT SCHEME FOR MULTICAST GROUPS USING GROUP KEY AGREEMENT AND BROADCAST ENCRYPTION
    Abirami, E.
    Padmavathy, T.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2017,
  • [2] Asymmetric group key agreement protocol for open networks and its application to broadcast encryption
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    Gonzalez-Nicolas, Ursula
    [J]. COMPUTER NETWORKS, 2011, 55 (15) : 3246 - 3255
  • [3] A Reliable Group Key Management Scheme for Broadcast Encryption
    Hur, Junbeom
    Lee, Younho
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (02) : 246 - 260
  • [4] An authenticated asymmetric group key agreement based on attribute encryption
    Zhang, Qikun
    Gan, Yong
    Liu, Lu
    Wang, Xianmin
    Luo, Xiangyang
    Li, Yuanzhang
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 123 : 1 - 10
  • [5] Authenticated secure group communication using broadcast encryption key computation
    Aparna, R.
    Amberker, B. B.
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 348 - +
  • [6] Reconfigurable key management for broadcast encryption
    Mihaljevic, MJ
    [J]. IEEE COMMUNICATIONS LETTERS, 2004, 8 (07) : 440 - 442
  • [7] Public key broadcast encryption for stateless receivers
    Dodis, Y
    Fazio, N
    [J]. DIGITAL RIGHTS MANAGEMENT, 2002, 2696 : 61 - 80
  • [8] Key preassigned traceability schemes for broadcast encryption
    Stinson, DR
    Wei, R
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 144 - 156
  • [9] Tree based symmetric key broadcast encryption
    Bhattacherjee, Sanjay
    Sarkar, Palash
    [J]. JOURNAL OF DISCRETE ALGORITHMS, 2015, 34 : 78 - 107
  • [10] Group secret key agreement over state-dependent wireless broadcast channels
    Siavoshani, M. Jafari
    Mishra, S.
    Diggavi, S. N.
    Fragouli, C.
    [J]. 2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011,