Anonymous Certificate-Based Broadcast Encryption With Personalized Messages

被引:36
|
作者
Chen, Liqing [1 ,2 ]
Li, Jiguo [1 ,3 ,4 ]
Zhang, Yichen [3 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Peoples R China
[2] Huaiyin Inst Technol, Fac Comp & Software Engn, Huaian 223003, Peoples R China
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
[4] State Key Lab Cryptol, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Adaptation models; Public key cryptography; Standards; Broadcast encryption; anonymity; chosen-ciphertext attack; standard model; adaptive security; ATTRIBUTE-BASED ENCRYPTION; DATA ACCESS-CONTROL; SCHEME; CIPHERTEXTS;
D O I
10.1109/TBC.2020.2984974
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Broadcast encryption with personalized messages (BEPM) is a newly proposed cryptographic primitive, which supports a broadcaster to deliver the common encrypted broadcast message to a group of authorized users. It also supports a broadcaster to deliver the personalized messages to the individual authorized users simultaneously. However, none of the existing BEPM schemes consider the anonymity of authorized users, which is a crucial security requirement for many BEPM application scenarios. Besides, the previous studies on BEPM only achieve security against chosen-plaintext attack adversaries. Certificate-based cryptosystem gives a viable way to construct more secure and efficient BEPM schemes. We propose the new concept of anonymous certificate-based broadcast encryption with personalized messages (ANON-CBBE-PM). Subsequently, we illustrate the formal definition and the security model of ANON-CBBE-PM. Furthermore, we present an ANON-CBBE-PM scheme, which solves key escrow problem in identity-based cryptosystem and certificate management problem in traditional public key cryptosystem. Compared with the existing BEPM schemes, the proposed scheme not only protects the privacy of authorized users, but also has advantage in performance. To be more specific, the lengths of the user secret key and the system public parameters, as well as the cost for decryption are constant. For those BEPM applications with a multitude of users whose computing ability is limited, the proposed scheme is more practical. In addition, our scheme simultaneously achieves anonymity and confidentiality under adaptive chosen-ciphertext attack in the standard model.
引用
收藏
页码:867 / 881
页数:15
相关论文
共 50 条
  • [21] Provable Secure Constructions for Broadcast Encryption with Personalized Messages
    Acharya, Kamalesh
    Dutta, Ratna
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 329 - 348
  • [22] Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited
    Gao, Wei
    Wang, Guilin
    Wang, Xueli
    Chen, Kefei
    COMPUTER JOURNAL, 2015, 58 (10): : 2747 - 2757
  • [23] CONSTRUCTING PAIRING-FREE CERTIFICATE-BASED ENCRYPTION
    Lu, Yang
    Li, Jiguo
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (11): : 4509 - 4518
  • [24] Hierarchical Certificate-Based Encryption: Definition and an Efficient Construction
    Xu, Hailin
    Lu, Yang
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1971 - 1974
  • [25] An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM)
    Xu, Ke
    Liao, Yongjian
    Qiao, Li
    Liu, Zhangyun
    Yang, Xiaowei
    PLOS ONE, 2015, 10 (12):
  • [26] Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited
    Gao, Wei (mygaowei@163.com), 1600, Oxford University Press (58):
  • [27] Continuous leakage-resilient certificate-based encryption
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    INFORMATION SCIENCES, 2016, 355 : 1 - 14
  • [28] Threshold Certificate-based Encryption: Definition and Concrete Construction
    Lu, Yang
    Li, Jiguo
    Xiao, Junmo
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 278 - +
  • [29] Certificate-Based Conditional Proxy Re-Encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 299 - 310
  • [30] A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Huang, Xinyi
    Xu, Li
    COMPUTER JOURNAL, 2012, 55 (10): : 1157 - 1168