Provably secure threshold public-key encryption with adaptive security and short ciphertexts

被引:18
|
作者
Qin, Bo [1 ,3 ]
Wu, Qianhong [1 ,2 ]
Zhang, Lei [4 ]
Farras, Oriol [1 ]
Domingo-Ferrer, Josep [1 ]
机构
[1] Univ Rovira & Virgili, Dept Comp Engn & Math, E-43007 Tarragona, Catalonia, Spain
[2] Wuhan Univ, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Sch Comp, Wuhan, Peoples R China
[3] Xian Univ Technol, Sch Sci, Dept Maths, Xian, Peoples R China
[4] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Software Engineer Inst, Shanghai 200062, Peoples R China
关键词
Public-key cryptosystem; Threshold public-key encryption; Adaptive security; Access control; BROADCAST ENCRYPTION; SIGNATURE; SCHEME;
D O I
10.1016/j.ins.2012.04.038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threshold public-key encryption is a cryptographic primitive allowing decryption control in group-oriented encryption applications. Existing TPKE schemes suffer from long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security, which is too weak to capture the capacity of the attackers in the real world. In this paper, we propose an efficient TPKE scheme with constant-size ciphertexts and adaptive security. Security is proven under the decision Bilinear Diffie-Hellman Exponentiation assumption in the standard model. Then we extend our basic construction with efficient trade-offs between the key size and the ciphertext size. Finally, we illustrate improvements to transmit multiple secret session keys in one session with almost no extra cost. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:67 / 80
页数:14
相关论文
共 50 条
  • [1] Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Domingo-Ferrer, Josep
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 62 - 76
  • [2] A brief history of provably-secure public-key encryption
    Dent, Alexander W.
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 357 - 370
  • [3] Provably secure public-key encryption with conjunctive and subset keyword search
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 533 - 548
  • [4] Provably secure public-key encryption with conjunctive and subset keyword search
    Oriol Farràs
    Jordi Ribes-González
    [J]. International Journal of Information Security, 2019, 18 : 533 - 548
  • [5] Provably secure public-key encryption for length-preserving Chaumian mixes
    Möller, B
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 244 - 262
  • [6] Selectively chosen ciphertext security in threshold public-key encryption
    Kim, Kitak
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (03) : 189 - 200
  • [7] A public-key encryption scheme with pseudo-random ciphertexts
    Möller, B
    [J]. COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 335 - 351
  • [8] A Note on Security of Public-Key Cryptosystem Provably as Secure as Subset Sum Problem
    Hamasho, Shinsuke
    Murakami, Yasuyuki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (01) : 298 - 299
  • [9] Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
    Tessaro, Stefano
    Wilson, David A.
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 257 - 274
  • [10] Dynamic threshold public-key encryption
    Delerablee, Cecile
    Pointcheval, David
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 317 - 334