Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext

被引:60
|
作者
Kim, Jongkil [1 ]
Susilo, Willy [1 ]
Au, Man Ho [2 ]
Seberry, Jennifer [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
关键词
Cryptography; public key; broadcast encryption; identity-based broadcast encryption; DUAL SYSTEM ENCRYPTION; FUNCTIONAL ENCRYPTION; EFFICIENT; HIBE;
D O I
10.1109/TIFS.2014.2388156
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present an adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext in the standard model. The size of the public key and the private keys of our system are both linear in the maximum number of receivers. In addition, our system is fully collusion-resistant and has stateless receivers. Compared with the state-of-the-art, our scheme is well optimized for the broadcast encryption. The computational complexity of decryption of our scheme depends only on the number of receivers, not the maximum number of receivers of the system. Technically, we employ dual system encryption technique and our proposal offers adaptive security under the general subgroup decisional assumption. Our scheme demonstrates that the adaptive security of the schemes utilizing a composite order group can be proven under the general subgroup decisional assumption, while many existing systems working in a composite order group are secure under multiple subgroup decision assumptions. We note that this finding is of an independent interest, which may be useful in other scenarios.
引用
收藏
页码:679 / 693
页数:15
相关论文
共 50 条
  • [1] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [2] Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
    孙瑾
    胡予濮
    张乐友
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 672 - 676
  • [3] Chosen ciphertext secure identity-based broadcast encryption in the standard model
    Sun J.
    Hu Y.-P.
    Zhang L.-Y.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (06) : 672 - 676
  • [4] Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 12 - 18
  • [5] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Li, Yan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 35 - 50
  • [6] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Weiran Liu
    Jianwei Liu
    Qianhong Wu
    Bo Qin
    Yan Li
    [J]. International Journal of Information Security, 2016, 15 : 35 - 50
  • [7] Adaptively Secure Identity-based Threshold Broadcast Encryption without Random Oracles
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    [J]. SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 347 - +
  • [8] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Liqing Chen
    Jiguo Li
    Yichen Zhang
    [J]. Soft Computing, 2020, 24 : 4589 - 4606
  • [9] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    [J]. SOFT COMPUTING, 2020, 24 (06) : 4589 - 4606
  • [10] Chosen Ciphertext Secure Fuzzy Identity-Based Encryption Scheme With Short Ciphertext
    Shi, Wenbo
    Jang, Injoo
    Yoo, Hyeong Seon
    [J]. ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1036 - 1040