An attribute-based anonymous broadcast encryption scheme with adaptive security in the standard model

被引:4
|
作者
Rabaninejad, R. [1 ]
Ameri, M. H. [2 ]
Delavar, M. [2 ]
Mohajeri, J. [2 ]
机构
[1] KN Toosi Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
关键词
Broadcast encryption; Ciphertext-Policy Attribute-Based Encryption (CP-ABE); Access structure; Anonymity; Provable security; Attack;
D O I
10.24200/sci.2017.4517
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In broadcast encryption schemes, a distribution center broadcasts an encrypted message to a subset chosen from a universe of receivers, and only the intended users are able to decrypt the message. Most broadcast encryption schemes do not provide anonymity, and the identities of target receivers are sent in plaintext. However, in several applications, the authorized user's identities have the same sensitivity as the broadcasted messages. Yu, Ren, and Lou (YRL) [Yu, S., Ren, K., and Lou, W. "Attribute-based on-demand multicast group setup with membership anonymity", Computer Networks, 54(3), pp. 377-386 (2010).] considered this issue and introduced an efficient anonymous attribute-based broadcast encryption scheme. This paper first proposed an attack on the YRL scheme, and showed that the unauthorized receivers could also decrypt the broadcasted message. Next, we proposed the Improved-YRL scheme and proved that it achieved anonymity and semantic security under adaptive corruptions in the chosen ciphertext setting. The proof is provided by the dual system encryption technique and is based on three complexity assumptions in composite order bilinear maps. The Improved-YRL scheme is a step forward in solving the long-standing problem of secure and low overhead anonymous broadcast encryption. (C) 2019 Sharif University of Technology. All rights reserved.
引用
收藏
页码:1700 / 1713
页数:14
相关论文
共 50 条
  • [1] Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
    Libert, Benoit
    Paterson, Kenneth G.
    Quaglia, Elizabeth A.
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 206 - 224
  • [2] Attribute-based broadcast encryption scheme for lightweight devices
    Canard, Sebastien
    Duong-Hieu Phan
    Viet Cuong Trinh
    [J]. IET INFORMATION SECURITY, 2018, 12 (01) : 52 - 59
  • [3] Attribute-based broadcast encryption scheme made efficient
    Lubicz, David
    Sirvent, Thomas
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 325 - +
  • [4] Attribute-Based Re-Encryption Scheme in the Standard Model
    GUO Shanqing1
    2. State Key Laboratory of Novel Software Technology
    [J]. Wuhan University Journal of Natural Sciences, 2008, (05) : 621 - 625
  • [6] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +
  • [7] Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
    Escala, Alex
    Herranz, Javier
    Morillo, Paz
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011, 2011, 6737 : 224 - 241
  • [8] Conjunctive Broadcast and Attribute-Based Encryption
    Attrapadung, Nuttapong
    Imai, Hideki
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 248 - 265
  • [9] On The Security of YRL, An Anonymous Broadcast Encryption Scheme
    Rabaninejad, Reyhaneh
    Delavar, Mahshid
    Ameri, Mohammad Hassan
    Mohajeri, Javad
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 752 - 755
  • [10] Efficient Anonymous Broadcast Encryption with Adaptive Security
    Zhou, Fu-Cai
    Lin, Mu-Qing
    Zhou, Yang
    Li, Yu-Xi
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (11): : 4680 - 4700