Anonymous Certificate-Based Broadcast Encryption With Personalized Messages

被引:36
|
作者
Chen, Liqing [1 ,2 ]
Li, Jiguo [1 ,3 ,4 ]
Zhang, Yichen [3 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Peoples R China
[2] Huaiyin Inst Technol, Fac Comp & Software Engn, Huaian 223003, Peoples R China
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
[4] State Key Lab Cryptol, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Adaptation models; Public key cryptography; Standards; Broadcast encryption; anonymity; chosen-ciphertext attack; standard model; adaptive security; ATTRIBUTE-BASED ENCRYPTION; DATA ACCESS-CONTROL; SCHEME; CIPHERTEXTS;
D O I
10.1109/TBC.2020.2984974
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Broadcast encryption with personalized messages (BEPM) is a newly proposed cryptographic primitive, which supports a broadcaster to deliver the common encrypted broadcast message to a group of authorized users. It also supports a broadcaster to deliver the personalized messages to the individual authorized users simultaneously. However, none of the existing BEPM schemes consider the anonymity of authorized users, which is a crucial security requirement for many BEPM application scenarios. Besides, the previous studies on BEPM only achieve security against chosen-plaintext attack adversaries. Certificate-based cryptosystem gives a viable way to construct more secure and efficient BEPM schemes. We propose the new concept of anonymous certificate-based broadcast encryption with personalized messages (ANON-CBBE-PM). Subsequently, we illustrate the formal definition and the security model of ANON-CBBE-PM. Furthermore, we present an ANON-CBBE-PM scheme, which solves key escrow problem in identity-based cryptosystem and certificate management problem in traditional public key cryptosystem. Compared with the existing BEPM schemes, the proposed scheme not only protects the privacy of authorized users, but also has advantage in performance. To be more specific, the lengths of the user secret key and the system public parameters, as well as the cost for decryption are constant. For those BEPM applications with a multitude of users whose computing ability is limited, the proposed scheme is more practical. In addition, our scheme simultaneously achieves anonymity and confidentiality under adaptive chosen-ciphertext attack in the standard model.
引用
收藏
页码:867 / 881
页数:15
相关论文
共 50 条
  • [31] An Efficient and Provably Secure Certificate-Based Encryption Scheme
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 54 - 61
  • [32] Hidden Attribute Certificate-based Encryption Extensions Model
    Li Yu
    Zhao Yong
    Gong Bei
    Xin Si-Yuan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 469 - 474
  • [33] Certificate-Based Encryption Scheme with General Access Structure
    Hyla, Tomasz
    Pejas, Jerzy
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (CISIM), 2012, 7564 : 41 - 55
  • [34] Provably secure certificate-based encryption with leakage resilience
    Guo, Yuyan
    Li, Jiguo
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    THEORETICAL COMPUTER SCIENCE, 2018, 711 : 1 - 10
  • [35] Generic Construction of Certificate-based Encryption in the Standard Model
    Lu, Yang
    Li, Jiguo
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 25 - 29
  • [36] Efficient certificate-based encryption schemes without pairing
    Le, Minh-Ha
    Kim, Intae
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5376 - 5391
  • [37] Anonymous Broadcast Messages
    Lazic, Dragan
    Obimbo, Charlie
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (12) : 36 - 41
  • [38] An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET
    Qiao, Zirui
    Ma, Kui
    Zhou, Yanwei
    Yang, Qiliang
    Xia, Zhe
    Yang, Bo
    Zhang, Mingwu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 11232 - 11245
  • [39] Constructing pairing-free certificate-based encryption
    Lu, Y. (luyangnsd@163.com), 1600, ICIC International (09):
  • [40] Constructions of broadcast encryption with personalized messages from bilinear map
    Acharya, Kamalesh
    Singh, Amit Kumar
    Mukhopadhyay, Sourav
    COMPUTER COMMUNICATIONS, 2023, 209 : 91 - 101