Authenticated public key broadcast encryption with short ciphertexts

被引:4
|
作者
Guo, Dianli [1 ,2 ]
Wen, Qiaoyan [1 ]
Jin, Zhengping [1 ]
Zhang, Hua [1 ]
Li, Wenmin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Natl Comp Syst Engn Res Inst China, Beijing 100083, Peoples R China
关键词
Broadcast encryption; Public key; Broadcaster authentication; Constant sized ciphertext; SECURE; SCHEME;
D O I
10.1007/s11042-019-7598-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption allows a broadcaster, who wants to distribute messages to a chosen subset of receivers, to produce an encrypted content and transmit it via a broadcast channel. Normally we think that it is preferable if the broadcast encryption system is a public-key cryptosystem, which permits anybody could encrypt and distribute messages with public parameters. Nevertheless, such a broadcast strategy brings along a slew of diffusions of the spam that are uncontrollable. Authenticated public key broadcast encryption ensures that no such strategy can succeed - the encryption algorithm creates ciphertext with public key and the broadcaster's secret key. It means that each broadcasted message is associated to the content distributor in order to ensure accountability. Technically, it embeds a signature in the ciphertext and each authorized users could verify it during decrypting. In this paper, we construct a solution for authenticated public key broadcast encryption using bilinear maps where the ciphertext is of O(1) (only constant number of group elements). The public key size and user private key are of size O(N) (N is the total number of users). The simulation experiment results indicated that the size of public key (private key) is about 4MB where we arbitrarily set N = 100000. Finally, we define the security for authenticated public key broadcast encryption and show that our construction captures static security in the standard model.
引用
收藏
页码:23399 / 23414
页数:16
相关论文
共 50 条
  • [41] Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product
    Che, Xiaoliang
    Liu, Longfei
    Wang, Baocang
    Han, Yiliang
    Wang, Xu An
    Yang, Xiaoyuan
    Zhou, Tanping
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (10)
  • [42] Adaptively secure broadcast encryption with authenticated content distributors
    Dianli Guo
    Qiaoyan Wen
    Wenmin Li
    Hua Zhang
    Zhengping Jin
    Multimedia Tools and Applications, 2020, 79 : 7889 - 7910
  • [43] Adaptively secure broadcast encryption with authenticated content distributors
    Guo, Dianli
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7889 - 7910
  • [44] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196
  • [45] A new construction of public key authenticated encryption with keyword search based on LWE
    Wang, Ziqing
    Li, Jin
    Liu, Xiaoguang
    Wu, Xinyan
    Li, Fagen
    TELECOMMUNICATION SYSTEMS, 2024, 86 (02) : 229 - 240
  • [46] Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
    JIANG, Z. H. E.
    ZHANG, K. A., I
    WANG, L. I. A. N. G. L. I. A. N. G.
    NING, J. I. A. N. T. I. N. G.
    COMPUTER JOURNAL, 2023, 66 (09): : 2265 - 2278
  • [47] Pairing-free public-key authenticated encryption with keyword search
    Bai, Lisha
    Yong, Lei
    Chen, Zhixian
    Shao, Jun
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [48] Public key authenticated encryption with multiple keywords search using Mamdani system
    Ma, Yang
    Kazemian, Hassan
    EVOLVING SYSTEMS, 2021, 12 (03) : 687 - 699
  • [49] Dual-Server Public-Key Authenticated Encryption with Keyword Search
    Chen, Biwen
    Wu, Libing
    Zeadally, Sherali
    He, Debiao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 322 - 333
  • [50] Improved hidden vector encryption with short ciphertexts and tokens
    Lee, Kwangsu
    Lee, Dong Hoon
    DESIGNS CODES AND CRYPTOGRAPHY, 2011, 58 (03) : 297 - 319