Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication
نویسندگان
چکیده
Abstract Broadcast Encryption (BE) is public-key encryption allowing a sender to encrypt message by specifing recipients, and only the specified recipients can decrypt message. In several BE applications, since privacy of allowed access often as important confidentiality message, anonymity introduced an additional but security requirement for BE. Kiayias Samari (IH 2013) presented asymptotic lower bound on ciphertext sizes in schemes satisfying (ANO-BE short). More precisely, their derived under assumption that ANO-BE have special property. However, it insufficient show asymptotically tight unclear whether existing meet this work, we derive bounds size assuming properties most satisfy. With similar technique, first asymptoticallyPlease provide MSC codes. For more details, please visit http://www.ams.org/msc/. authenticator Anonymous Authentication (ABA). Furthermore, extend above result present (non-asymptotically) upper thePlease check confirm Running title. ANO-BE. We variant scheme proposed Li Gong (ACNS 2018) optimal. also ABA via same approach ANO-BE, propose optimal construction ABA.
منابع مشابه
Lower Bounds for Private Broadcast Encryption
Broadcast encryption is a type of encryption where the sender can choose a subset from a set of designated receivers on the fly and enable them to decrypt a ciphertext while simultaneously preventing any other party from doing so. The notion of private broadcast encryption extends the primitive to a setting where one wishes to thwart an attacker that additionally attempts to extract information...
متن کاملFunctional Encryption : Constructions and Lower Bounds by Sergey Gorbunov
Functional Encryption: Constructions and Lower Bounds Sergey Gorbunov Master of Science Graduate Department of Computer Science University of Toronto 2012 Functional encryption is an emerging paradigm for public-key encryption that enables finegrained control of access to encrypted data. Given a secret key for a circuit C and an encryption of an input message x, a user should be able to learn t...
متن کاملOptimal Lower Bounds for Anonymous Scheduling Mechanisms
We consider the problem of designing truthful mechanisms on m unrelated machines, to minimize some optimization goal. Nisan and Ronen (1999) consider the specific goal of makespan minimization, and show a lower bound of 2, and an upper bound of m. This large gap inspired many attempts that yielded positive results for several special cases, but very partial success for the general case: the low...
متن کاملUnconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender’s anonymity play important roles in many applications. However, they will be meaningless if cryptographic primitives containing his identity is carelessly used during the transmission. The main contribution of this paper is to study the security primitives for the above problem. In this paper, we first define unconditionally secur...
متن کاملAnonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
In this paper we consider anonymity in the context of Broadcast Encryption (BE). This issue has received very little attention so far and all but one of the currently available BE schemes fail to provide anonymity. Yet, we argue that it is intrinsically desirable to provide anonymity in standard applications of BE and that it can be achieved at a moderate cost. We provide a security definition ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Designs, Codes and Cryptography
سال: 2023
ISSN: ['0925-1022', '1573-7586']
DOI: https://doi.org/10.1007/s10623-023-01211-x