Anonymous Certificate-Based Broadcast Encryption With Personalized Messages

被引:36
|
作者
Chen, Liqing [1 ,2 ]
Li, Jiguo [1 ,3 ,4 ]
Zhang, Yichen [3 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Peoples R China
[2] Huaiyin Inst Technol, Fac Comp & Software Engn, Huaian 223003, Peoples R China
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
[4] State Key Lab Cryptol, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Adaptation models; Public key cryptography; Standards; Broadcast encryption; anonymity; chosen-ciphertext attack; standard model; adaptive security; ATTRIBUTE-BASED ENCRYPTION; DATA ACCESS-CONTROL; SCHEME; CIPHERTEXTS;
D O I
10.1109/TBC.2020.2984974
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Broadcast encryption with personalized messages (BEPM) is a newly proposed cryptographic primitive, which supports a broadcaster to deliver the common encrypted broadcast message to a group of authorized users. It also supports a broadcaster to deliver the personalized messages to the individual authorized users simultaneously. However, none of the existing BEPM schemes consider the anonymity of authorized users, which is a crucial security requirement for many BEPM application scenarios. Besides, the previous studies on BEPM only achieve security against chosen-plaintext attack adversaries. Certificate-based cryptosystem gives a viable way to construct more secure and efficient BEPM schemes. We propose the new concept of anonymous certificate-based broadcast encryption with personalized messages (ANON-CBBE-PM). Subsequently, we illustrate the formal definition and the security model of ANON-CBBE-PM. Furthermore, we present an ANON-CBBE-PM scheme, which solves key escrow problem in identity-based cryptosystem and certificate management problem in traditional public key cryptosystem. Compared with the existing BEPM schemes, the proposed scheme not only protects the privacy of authorized users, but also has advantage in performance. To be more specific, the lengths of the user secret key and the system public parameters, as well as the cost for decryption are constant. For those BEPM applications with a multitude of users whose computing ability is limited, the proposed scheme is more practical. In addition, our scheme simultaneously achieves anonymity and confidentiality under adaptive chosen-ciphertext attack in the standard model.
引用
收藏
页码:867 / 881
页数:15
相关论文
共 50 条
  • [1] Anonymous Certificate-Based Inner Product Broadcast Encryption
    Yao, Shuang
    Zhang, Dawei
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [2] Anonymous certificate-based broadcast encryption with constant decryption cost
    Li, Jiguo
    Chen, Liqing
    Lu, Yang
    Zhang, Yichen
    INFORMATION SCIENCES, 2018, 454 : 110 - 127
  • [3] Anonymous Multi-Receiver Certificate-Based Encryption
    Fan, Chun-, I
    Tsai, Pei-Jen
    Huang, Jheng-Jia
    Chen, Wen-Tsuen
    2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 19 - 26
  • [4] Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model
    Hwang, Seong Oun
    Le, Minh-Ha
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (06) : 5971 - 5981
  • [5] Multi-receiver certificate-based encryption and application to public key broadcast encryption
    Sur, Chul
    Jung, Chae Duk
    Rhee, Kyung Hyune
    2007 ECSIS SYMPOSIUM ON BIO-INSPIRED, LEARNING, AND INTELLIGENT SYSTEMS FOR SECURITY, PROCEEDINGS, 2007, : 35 - +
  • [6] Threshold certificate-based encryption
    College of Computer and Information Engineering, Hohai University Nanjing, Jiangsu Province, China
    不详
    J. Softw., 2009, 3 (210-217):
  • [7] Certificate-based encryption and the certificate revocation problem
    Gentry, C
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 272 - 293
  • [8] Efficient Broadcast Encryption with Personalized Messages
    Ohtake, Go
    Hanaoka, Goichiro
    Ogawa, Kazuto
    PROVABLE SECURITY, 2010, 6402 : 214 - +
  • [9] Generic Construction of Certificate-based Encryption
    Lu, Yang
    Li, Jiguo
    Xia, Junmo
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1589 - +
  • [10] Towards Certificate-Based Group Encryption
    Ren, Yili
    Luo, Xiling
    Wu, Qianhong
    Liu, Joseph K.
    Zhang, Peng
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 296 - 305