Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext

被引:8
|
作者
Chen, Liqing [1 ,3 ]
Li, Jiguo [1 ,2 ,4 ]
Zhang, Yichen [2 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Jiangsu, Peoples R China
[2] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Fujian, Peoples R China
[3] Huaiyin Inst Technol, Fac Comp & Software Engn, Huaian 223003, Jiangsu, Peoples R China
[4] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Broadcast encryption; Public key broadcast encryption; Data access control; Cloud storage service; Adaptive security; Standard model; ATTRIBUTE-BASED ENCRYPTION; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; ENCAPSULATION; ALGORITHM; HIBE;
D O I
10.1007/s00500-019-04219-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In those broadcast application scenarios with a great quantity of receivers, e.g., the data access control system in cloud storage service, the single sender is apt to become the efficiency bottleneck of the system, because the computation and storage overhead of the sender will grow rapidly with the amount of qualified receivers. In order to overcome this problem, we first introduce the novel conception of complete binary identity tree which is adopted to manage the qualified receivers. Then we design the prune-merge algorithm to further optimize the structure of the tree and cut down the amount of receivers. The algorithm effectively reduces the computation and storage cost of the trusted authority in the system. Subsequently, in virtue of composite-order bilinear groups, we bring forward an efficient public key broadcast encryption scheme combined its application to the system of data access control in cloud storage service. Compared with the existing schemes, the lengths of system public parameters, secret key and ciphertext in our scheme are all constant. In addition, the number of secret keys in our scheme increases logarithmically with the maximum amount of receivers, while the numbers of secret keys in the existing schemes increase linearly with the maximum amount of receivers. Furthermore, the proposed scheme is proved to guarantee adaptive security under general subgroup decision assumption in the standard model. The performance analysis manifests that our scheme is feasible for those broadcast applications with fixed senders.
引用
收藏
页码:4589 / 4606
页数:18
相关论文
共 50 条
  • [1] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Liqing Chen
    Jiguo Li
    Yichen Zhang
    [J]. Soft Computing, 2020, 24 : 4589 - 4606
  • [2] Efficient Hidden Vector Encryption with Constant-Size Ciphertext
    Tran Viet Xuan Phuong
    Yang, Guomin
    Susilo, Willy
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 472 - 487
  • [3] Revocable Broadcast Encryption with Constant Ciphertext and Private Key Size
    Jia Hongyong
    Chen Yue
    Yang Kuiwu
    Guo Yuanbo
    Wang Zhiwei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (04) : 690 - 697
  • [4] Revocable Broadcast Encryption with Constant Ciphertext and Private Key Size
    JIA Hongyong
    CHEN Yue
    YANG Kuiwu
    GUO Yuanbo
    WANG Zhiwei
    [J]. Chinese Journal of Electronics, 2019, 28 (04) : 690 - 697
  • [5] Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext
    Kim, Jongkil
    Susilo, Willy
    Au, Man Ho
    Seberry, Jennifer
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 679 - 693
  • [6] Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
    Duong-Hieu Phan
    David Pointcheval
    Siamak F. Shahandashti
    Mario Strefler
    [J]. International Journal of Information Security, 2013, 12 : 251 - 265
  • [7] Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
    Phan, Duong-Hieu
    Pointcheval, David
    Shahandashti, Siamak F.
    Strefler, Mario
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (04) : 251 - 265
  • [8] Adaptively Secure Broadcast Encryption With Constant Ciphertexts
    Guo, Dianli
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    [J]. IEEE TRANSACTIONS ON BROADCASTING, 2016, 62 (03) : 709 - 715
  • [9] Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost
    Chen, Cheng
    Zhang, Zhenfeng
    Feng, Dengguo
    [J]. PROVABLE SECURITY, 2011, 6980 : 84 - 101
  • [10] Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption
    Canard, Sebastien
    Viet Cuong Trinh
    [J]. INFORMATION SYSTEMS SECURITY, 2016, 10063 : 193 - 211