An attribute-based anonymous broadcast encryption scheme with adaptive security in the standard model

被引:4
|
作者
Rabaninejad, R. [1 ]
Ameri, M. H. [2 ]
Delavar, M. [2 ]
Mohajeri, J. [2 ]
机构
[1] KN Toosi Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
关键词
Broadcast encryption; Ciphertext-Policy Attribute-Based Encryption (CP-ABE); Access structure; Anonymity; Provable security; Attack;
D O I
10.24200/sci.2017.4517
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In broadcast encryption schemes, a distribution center broadcasts an encrypted message to a subset chosen from a universe of receivers, and only the intended users are able to decrypt the message. Most broadcast encryption schemes do not provide anonymity, and the identities of target receivers are sent in plaintext. However, in several applications, the authorized user's identities have the same sensitivity as the broadcasted messages. Yu, Ren, and Lou (YRL) [Yu, S., Ren, K., and Lou, W. "Attribute-based on-demand multicast group setup with membership anonymity", Computer Networks, 54(3), pp. 377-386 (2010).] considered this issue and introduced an efficient anonymous attribute-based broadcast encryption scheme. This paper first proposed an attack on the YRL scheme, and showed that the unauthorized receivers could also decrypt the broadcasted message. Next, we proposed the Improved-YRL scheme and proved that it achieved anonymity and semantic security under adaptive corruptions in the chosen ciphertext setting. The proof is provided by the dual system encryption technique and is based on three complexity assumptions in composite order bilinear maps. The Improved-YRL scheme is a step forward in solving the long-standing problem of secure and low overhead anonymous broadcast encryption. (C) 2019 Sharif University of Technology. All rights reserved.
引用
收藏
页码:1700 / 1713
页数:14
相关论文
共 50 条
  • [31] APPLSS: Adaptive Privacy Preserved Location Sharing Scheme Based on Attribute-Based Encryption
    Yiliang Han
    Shuaishuai Zhu
    Yu Li
    Xi Lin
    [J]. China Communications, 2021, 18 (03) : 105 - 121
  • [32] Fully Anonymous Attribute-Based Encryption with Privacy and Access Privilege
    Kartik
    Chandrasekhar, B. N.
    Lakshmi, H.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 416 - 418
  • [33] An Efficient and Anonymous Attribute-Based Group Setup Scheme
    Li, Bing
    Wang, Zhijie
    Huang, Dijiang
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 861 - 866
  • [34] APPLSS: Adaptive Privacy Preserved Location Sharing Scheme Based on Attribute-Based Encryption
    Han, Yiliang
    Zhu, Shuaishuai
    Li, Yu
    Lin, Xi
    [J]. CHINA COMMUNICATIONS, 2021, 18 (03) : 105 - 121
  • [35] A Multi Sender Attribute-Based Broadcast Authentication Scheme
    Aghapour, Saeed
    Ameri, Mohammad Hassan
    Mohajeri, Javad
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 78 - 83
  • [36] Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
    Minh Ha Le
    Vinh Duc Tran
    Van Anh Trinh
    Viet Cuong Trinh
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 804 : 219 - 235
  • [37] Fully adaptive attribute-based group signature in standard model
    Li, Bao Hong
    Huang, Yi Yang
    Zhao, Ying Liang
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2015, 38 (02) : 200 - 207
  • [38] Security analyses of a data collaboration scheme with hierarchical attribute-based encryption in cloud computing
    Tai, Wei-Liang
    Chang, Ya-Fen
    Huang, Wen-Hsin
    [J]. International Journal of Network Security, 2020, 22 (02): : 212 - 217
  • [39] Generalized Anonymous Broadcast Encryption Scheme
    Ting, Pei-Yih
    Chang, Shu-Wei
    Wu, Tzong-Sun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (02): : 327 - 335
  • [40] Revocable attribute-based encryption from standard lattices
    Luo, Fucai
    Al-Kuwari, Saif
    Wang, Haiyan
    Wang, Fuqun
    Chen, Kefei
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 84