Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time

نویسندگان

  • Yi-Ru Liu
  • Wen-Guey Tzeng
چکیده

In this paper we propose two public key BE schemes that have efficient complexity measures. The first scheme, called the PBE-PI scheme, has O(r) header size, O(1) public keys and O(log N) private keys per user, where r is the number of revoked users. This is the first public key BE scheme that has both public and private keys under O(log N) while the header size is O(r). These complexity measures match those of efficient secret key BE schemes. Our second scheme, called the PBE-SD-PI scheme, has O(r) header size, O(1) public key and O(log N) private keys per user also. However, its decryption time is remarkably O(1). This is the first public key BE scheme that has O(1) decryption time while other complexity measures are kept low. Overall, this is the most efficient public key BE scheme up to now. Our basic schemes are one-way secure against full collusion of revoked users in the random oracle model under the BDH assumption. We modify our schemes to have indistinguishably security against adaptive chosen ciphertext attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys

This paper puts forward new efficient constructions for public-key broadcast encryption that simultaneously enjoy the following properties: receivers are stateless; encryption is collusion-secure for arbitrarily large collusions of users and security is tight in the standard model; new users can join dynamically i.e. without modification of user decryption keys nor ciphertext size and little or...

متن کامل

An Adaptively Secure Identity-Based Broadcast Encryption using CAST Algorithm

An adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext is introduced. The size of public key and private keys of the system are both linear in the maximum number of receivers. The system is fully collusion-resistant and has stateless receivers. Here, in the system CAST algorithm is used for encryption of the broadcast message. The scheme is well opti...

متن کامل

The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers

The Broadcast Encryption methods, often referred to as revocation schemes, allow data to be efficiently broadcast to a dynamically changing group of users. A special case is when the receivers are stateless [2, 1]. Naor et al. [2] propose the Complete Subset Method (CSM) and the Subset Difference Method (SDM). Asano [1] puts forth two other methods, AM1 and AM2, which use public prime parameter...

متن کامل

Study on Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

Traditional broadcast encryption (BE) schemes al-low a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so that only the group members can decrypt the ciphertexts encrypted under the shared encryption key, but a send...

متن کامل

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2007  شماره 

صفحات  -

تاریخ انتشار 2007