(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard

被引:1
|
作者
Barthoulot, Anais [1 ,2 ]
Blazy, Olivier [3 ]
Canard, Sebastien [1 ]
机构
[1] Orange Innovat, Caen, France
[2] Univ Limoges, XLim, Limoges, France
[3] Ecole Polytech, Palaiseau, France
来源
关键词
Broadcast encryption; Augmented broadcast encryption; Broadcast and trace; Identity based encryption with wildcard; DUAL SYSTEM ENCRYPTION; PRIME-ORDER GROUPS; SHORT CIPHERTEXTS;
D O I
10.1007/978-3-031-20974-1_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several broadcast encryption (BE) constructions have been proposed since Fiat and Naor introduced the concept, some achieving short parameters size while others achieve better security. Since 1994, a lot of alternatives to BE have moreover been additionally proposed, such as the broadcast and trace (BT) primitive which is a combination of broadcast encryption and traitor tracing. Among the other variants of BE, the notion of augmented BE (AugBE), introduced by Boneh and Waters in 2006, corresponds to a BE scheme with the particularity that the encryption algorithm takes an index as an additional parameter. If an AugBE scheme is both message and index hiding, it has been proved that it can generically be used to construct a secure BT scheme. Hence, any new result related to the former gives an improvement to the latter. In this paper, we first show that both BE and AugBE can be obtained by using an identity-based encryption scheme with wildcard (WIBE). We also introduce the new notion of anonymous AugBE, where the used users set is hidden, and prove that it implies index hiding. We then provide two different WIBE constructions. The first one has constant size ciphertext and used to construct a new constant size ciphertext BE scheme with adaptive CPA security, in the standard model (under the SXDH assumption). The second WIBE provides pattern-hiding, a new definition we introduced, and serves as a basis for the first anonymous AugBE scheme (and subsequently a BT scheme since our scheme is also index hiding by nature) in the literature, with adaptive security in the standard model (under the XDLin assumption).
引用
收藏
页码:143 / 164
页数:22
相关论文
共 50 条
  • [41] Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption
    Garg, Rachit
    Goyal, Rishab
    Lu, George
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 736 - 763
  • [43] Broadcast encryption schemes based on RSA
    MU, Ning-bo
    HU, Yu-pu
    OU, Hai-wen
    [J]. Journal of China Universities of Posts and Telecommunications, 2009, 16 (01): : 69 - 75
  • [44] Practical wildcard searchable encryption with tree-based index
    Zhang, Xi
    Zhao, Bo
    Qin, Jing
    Hou, Wei
    Su, Ye
    Yang, Haining
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (12) : 7475 - 7499
  • [45] Broadcast Encryption Based on Braid Groups
    Saguansakdiyotin, Norranut
    Hiranvanichakorn, Pipat
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (02): : 12 - 19
  • [46] RSA accumulator based broadcast encryption
    Gentry, C
    Ramzan, Z
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 73 - 86
  • [47] A DRM based on renewable broadcast encryption
    Ramkumar, M
    Memon, N
    [J]. Visual Communications and Image Processing 2005, Pts 1-4, 2005, 5960 : 1101 - 1111
  • [48] Identity-based broadcast encryption with constant size ciphertexts and private keys
    Delerablee, Cecile
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 200 - 215
  • [49] Fully secure anonymous identity based broadcast encryption with group of prime order
    Ming, Yang
    Yuan, Hongping
    [J]. International Journal of Network Security, 2019, 21 (01) : 7 - 16
  • [50] Broadcast encryption using identity-based public-key cryptosystem
    Lv, XX
    Yang, B
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 1092 - 1097