(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard

被引:1
|
作者
Barthoulot, Anais [1 ,2 ]
Blazy, Olivier [3 ]
Canard, Sebastien [1 ]
机构
[1] Orange Innovat, Caen, France
[2] Univ Limoges, XLim, Limoges, France
[3] Ecole Polytech, Palaiseau, France
来源
关键词
Broadcast encryption; Augmented broadcast encryption; Broadcast and trace; Identity based encryption with wildcard; DUAL SYSTEM ENCRYPTION; PRIME-ORDER GROUPS; SHORT CIPHERTEXTS;
D O I
10.1007/978-3-031-20974-1_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several broadcast encryption (BE) constructions have been proposed since Fiat and Naor introduced the concept, some achieving short parameters size while others achieve better security. Since 1994, a lot of alternatives to BE have moreover been additionally proposed, such as the broadcast and trace (BT) primitive which is a combination of broadcast encryption and traitor tracing. Among the other variants of BE, the notion of augmented BE (AugBE), introduced by Boneh and Waters in 2006, corresponds to a BE scheme with the particularity that the encryption algorithm takes an index as an additional parameter. If an AugBE scheme is both message and index hiding, it has been proved that it can generically be used to construct a secure BT scheme. Hence, any new result related to the former gives an improvement to the latter. In this paper, we first show that both BE and AugBE can be obtained by using an identity-based encryption scheme with wildcard (WIBE). We also introduce the new notion of anonymous AugBE, where the used users set is hidden, and prove that it implies index hiding. We then provide two different WIBE constructions. The first one has constant size ciphertext and used to construct a new constant size ciphertext BE scheme with adaptive CPA security, in the standard model (under the SXDH assumption). The second WIBE provides pattern-hiding, a new definition we introduced, and serves as a basis for the first anonymous AugBE scheme (and subsequently a BT scheme since our scheme is also index hiding by nature) in the literature, with adaptive security in the standard model (under the XDLin assumption).
引用
收藏
页码:143 / 164
页数:22
相关论文
共 50 条
  • [1] Augmented broadcaster identity-based broadcast encryption
    [J]. 1600, Digital Information Research Foundation, 2 Srinivasamoorthy Avenue, L.B Road, Adyar, Chennai, 600 020, India (11):
  • [2] Flexible Identity based Attribute Encryption from Identity based Broadcast Encryption
    Sakai, Ryuichi
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 342 - 345
  • [3] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [4] Identity-based authenticated broadcast encryption and distributed authenticated encryption
    Mu, Y
    Susilo, W
    Lin, YX
    Ruan, C
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 169 - 181
  • [5] Identity Based Broadcast Encryption Based on One to Many Identity Based Proxy Re-encryption
    Wang, Xu An
    Yang, Xiaoyuan
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 47 - 50
  • [6] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [7] Vulnerability of an identity based broadcast encryption scheme
    Wang, Xu'an
    Yang, Xiaoyuan
    Wu, Guangming
    Ding, Yi
    [J]. Journal of Information and Computational Science, 2011, 8 (16): : 4143 - 4148
  • [8] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [9] Generalized Identity Based and Broadcast Encryption Schemes
    Boneh, Dan
    Hamburg, Michael
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 455 - 470
  • [10] Hierarchical Identity-based Broadcast Encryption Scheme from LWE
    Yang, Chunli
    Zheng, Shihui
    Wang, Licheng
    Lu, Xiuhua
    Yang, Yixian
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2014, 16 (03) : 258 - 263