Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles

被引:18
|
作者
Xie Li [1 ]
Ren Yanli [1 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai, Peoples R China
基金
上海市自然科学基金;
关键词
Anonymous; Bilinear Groups of Prime Order; Broadcast Encryption; Identity-Based; Without Random Oracles;
D O I
10.4018/ijdcf.2014040103
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Broadcast encryption provides a method of secure multi-receiver communications, where a broadcaster can encrypt a message for a set S of users who are listening to a broadcast channel. Most identity-based broadcast encryption (IBBE) schemes are not anonymous, which means the attacker can obtain the identities of all receivers from the ciphertext. In this paper, the authors propose an efficient anonymous IBBE scheme in bilinear groups of prime order, where any attacker cannot get the identities of the receivers from the ciphertext. The scheme has constant size ciphertext and achieves adaptive security based on the asymmetric decisional bilinear Diffie-Hellman Exponent (DBDHE) assumption without random oracles. The proposed scheme improves efficiency and security of anonymous IBBE schemes simultaneously.
引用
收藏
页码:40 / 51
页数:12
相关论文
共 50 条
  • [21] AN EFFICIENT IDENTITY-BASED RING SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES
    Sun Hua
    Guo Li
    Wang Aimin
    [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 673 - +
  • [22] Cryptanalysis of RNZ, an identity-based fully anonymous broadcast encryption
    Mandal, Mriganka
    [J]. ICT EXPRESS, 2020, 6 (04): : 316 - 319
  • [23] Secure identity based encryption without random oracles
    Boneh, D
    Boyen, X
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 443 - 459
  • [24] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255
  • [25] Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging
    Mandal, Mriganka
    Nuida, Koji
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2020, 2020, 12570 : 167 - 186
  • [26] An Efficient Anonymous Identity-Based Broadcast Encryption for Large-Scale Wireless Sensor Networks
    Kim, In Tae
    Hwang, Seong Oun
    Kim, Seungwoon
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2012, 14 (1-2) : 27 - 39
  • [27] Fully CCA2 secure identity based broadcast encryption without random oracles
    Ren, Yanli
    Gu, Dawu
    [J]. INFORMATION PROCESSING LETTERS, 2009, 109 (11) : 527 - 533
  • [28] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [29] Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
    Yu, Jia
    Cheng, Xiangguo
    Hao, Rong
    Kong, Fanyu
    Fan, Jianxi
    [J]. FUNDAMENTA INFORMATICAE, 2011, 111 (02) : 241 - 256
  • [30] Collusion-Resistant Identity-Based Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Jo, JungBok
    Lee, HoonJae
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 337 - 344