Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

被引:0
|
作者
Libert, Benoit [1 ]
Paterson, Kenneth G. [2 ]
Quaglia, Elizabeth A. [2 ]
机构
[1] Catholic Univ Louvain, ICTEAM Inst, Louvain La Neuve, Belgium
[2] Royal Holloway Univ London, Informat Secur Grp, London, England
来源
基金
英国工程与自然科学研究理事会;
关键词
Broadcast Encryption; Anonymity; CHOSEN-CIPHERTEXT SECURITY; IDENTITY-BASED ENCRYPTION; CONSTANT-SIZE CIPHERTEXTS; HYBRID ENCRYPTION; RANDOMNESS REUSE; PRIVACY; SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we consider anonymity in the context of Broadcast Encryption (BE). This issue has received very little attention so far and all but one of the currently available BE schemes fail to provide anonymity. Yet, we argue that it is intrinsically desirable to provide anonymity in standard applications of BE and that it can be achieved at a moderate cost. We provide a security definition for Anonymous Broadcast Encryption (ANOBE) and show that it is achievable assuming only the existence of IND-CCA secure public key encryption (PKE). Focusing on reducing the size of ciphertexts, we then give two generic constructions for ANOBE. The first is from any anonymous (key-private) IND-CCA secure PKE scheme, and the second is from any IBE scheme that satisfies a weak security notion in the multi-TA setting. Furthermore, we show how randomness re-use techniques can be deployed in the ANOBE context to reduce computational and communication costs, and how a new cryptographic primitive - anonymous hint systems - can be used to speed up the decryption process in our ANOBE constructions. All of our results are in the standard model, achieving fully collusion-resistant ANOBE schemes secure against adaptive IND-CCA adversaries.
引用
收藏
页码:206 / 224
页数:19
相关论文
共 50 条
  • [1] Efficient Anonymous Broadcast Encryption with Adaptive Security
    Zhou, Fu-Cai
    Lin, Mu-Qing
    Zhou, Yang
    Li, Yu-Xi
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (11): : 4680 - 4700
  • [2] An attribute-based anonymous broadcast encryption scheme with adaptive security in the standard model
    Rabaninejad, R.
    Ameri, M. H.
    Delavar, M.
    Mohajeri, J.
    [J]. SCIENTIA IRANICA, 2019, 26 (03) : 1700 - 1713
  • [3] On The Security of YRL, An Anonymous Broadcast Encryption Scheme
    Rabaninejad, Reyhaneh
    Delavar, Mahshid
    Ameri, Mohammad Hassan
    Mohajeri, Javad
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 752 - 755
  • [4] Adaptive Security of Broadcast Encryption, Revisited
    Zhu, Bingxin
    Wei, Puwen
    Wang, Mingqiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [5] Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication
    Hirokazu Kobayashi
    Yohei Watanabe
    Kazuhiko Minematsu
    Junji Shikata
    [J]. Designs, Codes and Cryptography, 2023, 91 : 2523 - 2562
  • [6] Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication
    Kobayashi, Hirokazu
    Watanabe, Yohei
    Minematsu, Kazuhiko
    Shikata, Junji
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (07) : 2523 - 2562
  • [7] Efficient Anonymous Multi-group Broadcast Encryption
    Kim, Intae
    Hwang, Seong Oun
    Susilo, Willy
    Baek, Joonsang
    Kim, Jongkil
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 251 - 270
  • [8] Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Wang, Zhuanning
    Wu, Qing
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 201 - 210
  • [9] Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
    Gentry, Craig
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 171 - +
  • [10] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255