A Strong Binding Encryption Scheme from Lattices for Secret Broadcast

被引:2
|
作者
Noh, Geontae [1 ]
Hong, Dowon [2 ]
Kwon, Jeong Ok [3 ]
Jeong, Ik Rae [1 ]
机构
[1] Korea Univ, Grad Sch Informat Secur, CIST, Seoul, South Korea
[2] Kongju Natl Univ, Dept Appl Math, Chungcheongnam Do, South Korea
[3] Samsung SDS, Integrated Secur Consulting Grp, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Secret broadcast; binding encryption; decryption consistency; lattice;
D O I
10.1109/LCOMM.2012.041112.112495
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In 2009, Jeong et al. suggested a secret broadcast scheme in broadcasting networks using binding encryption. With a binding encryption scheme, a ciphertext is made for a group of receivers, and we can assure that all of the receivers will extract the exact same plaintext from the ciphertext. However, Wu et al. pointed out that Jeong et al.'s binding encryption scheme provides only weak decryption consistency. In this paper, we suggest a binding encryption scheme that provides strong decryption consistency without random oracles. Our binding encryption scheme uses the unique properties of lattices to provide strong decryption consistency.
引用
收藏
页码:781 / 784
页数:4
相关论文
共 50 条
  • [1] Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks
    Zhang, Mingwu
    Li, Fagen
    Takagi, Tsuyoshi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (02) : 686 - 689
  • [2] Updating A Secret Key for MAC Implemented on CAN Using Broadcast Encryption Scheme
    Tatara, Tomoya
    Ogura, Hiroto
    Kodera, Yuta
    Kusaka, Takuya
    Nogami, Yasuyuki
    [J]. 2019 34TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2019), 2019, : 275 - 278
  • [3] Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things
    He, Kai
    Liu, Xueqiao
    Liu, Jia-Nan
    Liu, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [4] A Comparison on Broadcast Encryption Schemes: A New Broadcast Encryption Scheme
    Bodur, Huseyin
    Kara, Resul
    [J]. ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2020, 20 (04) : 69 - 80
  • [5] The LSD broadcast encryption scheme
    Halevy, D
    Shamir, A
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 47 - 60
  • [6] Improvement of the Efficient Secret Broadcast Scheme
    Yoon, Eun-Jun
    Khan, Muhammad Khurram
    Yoo, Kee-Young
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (12) : 3396 - 3399
  • [7] Generalized Anonymous Broadcast Encryption Scheme
    Ting, Pei-Yih
    Chang, Shu-Wei
    Wu, Tzong-Sun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (02): : 327 - 335
  • [8] A Secret Key Encryption Scheme Based on 1-Level QC-LDPC Lattices
    Bagheri, Khadijeh
    Sadeghi, Mohammad-Reza
    Eghlidos, Taraneh
    Panario, Daniel
    [J]. 2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 20 - 25
  • [9] A secret sharing scheme for image encryption
    Lukac, R
    Plataniotis, KN
    [J]. PROCEEDINGS ELMAR-2004: 46TH INTERNATIONAL SYMPOSIUM ELECTRONICS IN MARINE, 2004, : 549 - 554
  • [10] Hierarchical Identity-based Broadcast Encryption Scheme from LWE
    Yang, Chunli
    Zheng, Shihui
    Wang, Licheng
    Lu, Xiuhua
    Yang, Yixian
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2014, 16 (03) : 258 - 263