A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption

被引:11
|
作者
Canard, S. [1 ]
Phan, D. H. [2 ]
Pointcheval, D. [3 ,5 ]
Trinh, V. C. [4 ]
机构
[1] Orange Labs, Appl Crypto Grp, Caen, France
[2] Univ Limoges, Limoges, France
[3] PSL Res Univ, CNRS, Dept Informat, ENS, F-75005 Paris, France
[4] Hong Duc Univ, Thanh Hoa, Vietnam
[5] INRIA, Le Chesnay, France
关键词
Broadcast encryption; Multi-channel broadcast encryption; Attribute-based encryption; CONSTANT SIZE CIPHERTEXTS; SCHEME; SECURE;
D O I
10.1016/j.tcs.2018.02.036
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Standard Broadcast Encryption (BE) and Attribute-Based Encryption (ABE) aim at sending a content to a large arbitrary group of users at once. Regarding Broadcast Encryption, currently, the most efficient schemes provide constant-size headers, that encapsulate ephemeral session keys under which the payload is encrypted. However, in practice, and namely for pay-TV, providers have to send various contents to different groups of users. Headers are thus specific to each group, one for each channel: as a consequence, the global overhead is linear in the number of channels. Furthermore, when one wants to zap to and watch another channel, one has to get the new header and decrypt it to learn the new session key: either the headers are sent quite frequently or one has to store all the headers, even if one watches one channel only. Otherwise, the zapping time becomes unacceptably long. We consider the encapsulation of several ephemeral keys, for various groups and thus various channels, in one header only, and we call this new primitive Multi-Channel Broadcast Encryption or MCBE: one can hope for a much shorter global overhead and a much shorter zapping time since the decoder already has the information to decrypt any available channel at once. Regarding Attribute-Based Encryption, a scheme with constant-size ciphertext is still a challenging task. In this paper, we introduce a new technique of optimizing the ciphertext-size for both MCBE and ABE schemes. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:51 / 72
页数:22
相关论文
共 50 条
  • [31] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [32] Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption
    Zuo, Cong
    Shao, Jun
    Wei, Guiyi
    Xie, Mande
    Ji, Min
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 495 - 508
  • [33] Efficient Ciphertext Deduplication and Auditing Scheme with Attribute-based Encryption
    Ma Hua
    Dang Qianlong
    Wang Jianfeng
    Liu Zhenhua
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (02) : 355 - 361
  • [34] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    [J]. SENSORS, 2019, 19 (07)
  • [35] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [36] Attribute-based broadcast encryption scheme for lightweight devices
    Canard, Sebastien
    Duong-Hieu Phan
    Viet Cuong Trinh
    [J]. IET INFORMATION SECURITY, 2018, 12 (01) : 52 - 59
  • [37] Attribute-based broadcast encryption scheme made efficient
    Lubicz, David
    Sirvent, Thomas
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 325 - +
  • [38] Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Wu, Yulin
    Yiu, S. M.
    [J]. 2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 1003 - 1008
  • [39] A Ciphertext-Policy Attribute-Based Encryption Based on Multi-valued Decision Diagram
    Zhang, Shaowei
    Li, Long
    Chang, Liang
    Gu, Tianlong
    Liu, Huadong
    [J]. INTELLIGENT INFORMATION PROCESSING IX, 2018, 538 : 303 - 310
  • [40] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Shijie Deng
    Gaobo Yang
    Wen Dong
    Ming Xia
    [J]. Multimedia Tools and Applications, 2023, 82 : 22251 - 22274