Anonymous Certificate-Based Broadcast Encryption With Personalized Messages

被引:36
|
作者
Chen, Liqing [1 ,2 ]
Li, Jiguo [1 ,3 ,4 ]
Zhang, Yichen [3 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Peoples R China
[2] Huaiyin Inst Technol, Fac Comp & Software Engn, Huaian 223003, Peoples R China
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
[4] State Key Lab Cryptol, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Adaptation models; Public key cryptography; Standards; Broadcast encryption; anonymity; chosen-ciphertext attack; standard model; adaptive security; ATTRIBUTE-BASED ENCRYPTION; DATA ACCESS-CONTROL; SCHEME; CIPHERTEXTS;
D O I
10.1109/TBC.2020.2984974
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Broadcast encryption with personalized messages (BEPM) is a newly proposed cryptographic primitive, which supports a broadcaster to deliver the common encrypted broadcast message to a group of authorized users. It also supports a broadcaster to deliver the personalized messages to the individual authorized users simultaneously. However, none of the existing BEPM schemes consider the anonymity of authorized users, which is a crucial security requirement for many BEPM application scenarios. Besides, the previous studies on BEPM only achieve security against chosen-plaintext attack adversaries. Certificate-based cryptosystem gives a viable way to construct more secure and efficient BEPM schemes. We propose the new concept of anonymous certificate-based broadcast encryption with personalized messages (ANON-CBBE-PM). Subsequently, we illustrate the formal definition and the security model of ANON-CBBE-PM. Furthermore, we present an ANON-CBBE-PM scheme, which solves key escrow problem in identity-based cryptosystem and certificate management problem in traditional public key cryptosystem. Compared with the existing BEPM schemes, the proposed scheme not only protects the privacy of authorized users, but also has advantage in performance. To be more specific, the lengths of the user secret key and the system public parameters, as well as the cost for decryption are constant. For those BEPM applications with a multitude of users whose computing ability is limited, the proposed scheme is more practical. In addition, our scheme simultaneously achieves anonymity and confidentiality under adaptive chosen-ciphertext attack in the standard model.
引用
收藏
页码:867 / 881
页数:15
相关论文
共 50 条
  • [41] Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages
    Han, Jin Ho
    Park, Jong Hwan
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (04) : 796 - 806
  • [42] Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model
    Guo, Yuyan
    Li, Jiguo
    Jiang, Mingming
    Yu, Lei
    Wei, Shimin
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [43] Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption
    Lu, Yang
    Li, Jiguo
    Xiao, Junmo
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 296 - +
  • [44] Multi-Recipient Certificate-Based Searchable Encryption Scheme
    Liu H.
    Ming Y.
    Wang C.-H.
    Zhao Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 544 - 557
  • [45] Efficient certificate-based public-key encryption scheme
    Information Security and National Grid Computing Laboratory, Southwest Jiaotong University, Chengdu 610031, China
    Tien Tzu Hsueh Pao, 2008, 10 (2055-2059): : 2055 - 2059
  • [46] Certificate-Based Anonymous Device Access Control Scheme for IoT Environment
    Malani, Saurav
    Srinivas, Jangirala
    Das, Ashok Kumar
    Srinathan, Kannan
    Jo, Minho
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9762 - 9773
  • [47] An Efficient Certificate-Based Encryption Scheme Without Random Oracles
    Guo, Lan
    Lu, Yang
    Miao, Qing
    Zu, Guangao
    Wang, Zhongqi
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 97 - 107
  • [48] Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings
    Lu, Yang
    Zhang, Quanling
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (02): : 881 - 896
  • [49] Provably Secure Certificate-based Conditional Proxy Re-encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    Yao, Wei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (04) : 813 - 830
  • [50] A Distributed Approach of a Threshold Certificate-Based Encryption Scheme with No Trusted Entities
    Fournaris, Apostolos P.
    INFORMATION SECURITY JOURNAL, 2013, 22 (03): : 126 - 139