Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication

نویسندگان

چکیده

Abstract Broadcast Encryption (BE) is public-key encryption allowing a sender to encrypt message by specifing recipients, and only the specified recipients can decrypt message. In several BE applications, since privacy of allowed access often as important confidentiality message, anonymity introduced an additional but security requirement for BE. Kiayias Samari (IH 2013) presented asymptotic lower bound on ciphertext sizes in schemes satisfying (ANO-BE short). More precisely, their derived under assumption that ANO-BE have special property. However, it insufficient show asymptotically tight unclear whether existing meet this work, we derive bounds size assuming properties most satisfy. With similar technique, first asymptoticallyPlease provide MSC codes. For more details, please visit http://www.ams.org/msc/. authenticator Anonymous Authentication (ABA). Furthermore, extend above result present (non-asymptotically) upper thePlease check confirm Running title. ANO-BE. We variant scheme proposed Li Gong (ACNS 2018) optimal. also ABA via same approach ANO-BE, propose optimal construction ABA.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lower Bounds for Private Broadcast Encryption

Broadcast encryption is a type of encryption where the sender can choose a subset from a set of designated receivers on the fly and enable them to decrypt a ciphertext while simultaneously preventing any other party from doing so. The notion of private broadcast encryption extends the primitive to a setting where one wishes to thwart an attacker that additionally attempts to extract information...

متن کامل

Functional Encryption : Constructions and Lower Bounds by Sergey Gorbunov

Functional Encryption: Constructions and Lower Bounds Sergey Gorbunov Master of Science Graduate Department of Computer Science University of Toronto 2012 Functional encryption is an emerging paradigm for public-key encryption that enables finegrained control of access to encrypted data. Given a secret key for a circuit C and an encryption of an input message x, a user should be able to learn t...

متن کامل

Optimal Lower Bounds for Anonymous Scheduling Mechanisms

We consider the problem of designing truthful mechanisms on m unrelated machines, to minimize some optimization goal. Nisan and Ronen (1999) consider the specific goal of makespan minimization, and show a lower bound of 2, and an upper bound of m. This large gap inspired many attempts that yielded positive results for several special cases, but very partial success for the general case: the low...

متن کامل

Unconditionally Secure Anonymous Encryption and Group Authentication

Anonymous channels or similar techniques that can achieve sender’s anonymity play important roles in many applications. However, they will be meaningless if cryptographic primitives containing his identity is carelessly used during the transmission. The main contribution of this paper is to study the security primitives for the above problem. In this paper, we first define unconditionally secur...

متن کامل

Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

In this paper we consider anonymity in the context of Broadcast Encryption (BE). This issue has received very little attention so far and all but one of the currently available BE schemes fail to provide anonymity. Yet, we argue that it is intrinsically desirable to provide anonymity in standard applications of BE and that it can be achieved at a moderate cost. We provide a security definition ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Designs, Codes and Cryptography

سال: 2023

ISSN: ['0925-1022', '1573-7586']

DOI: https://doi.org/10.1007/s10623-023-01211-x