Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness

نویسندگان

  • Yohei Watanabe
  • Goichiro Hanaoka
  • Junji Shikata
چکیده

Data stored in cloud storage sometimes requires long-term security due to its sensitivity (e.g.,genome data), and therefore, it also requires flexible access control for handling entities who canuse the data. Broadcast encryption can partially provide such flexibility by specifying privilegedreceivers so that only they can decrypt a ciphertext. However, once privileged receivers arespecified, they can be no longer dynamically added and/or removed. In this paper, we proposea new type of broadcast encryption which provides long-term security and appropriate accesscontrol, which we call unconditionally secure revocable-storage broadcast encryption (RS-BE).In RS-BE, privileged receivers of a ciphertext can be dynamically updated without revealingany information on the underlying plaintext. Specifically, we define a model and security ofRS-BE, derive tight lower bounds on sizes of secret keys required for secure RS-BE, and proposea construction of RS-BE which meets all of these bounds. Our lower bounds can be appliedto traditional broadcast encryption. Furthermore, to detect an improper update, we considersecurity against modification attacks to a ciphertext, and present a concrete construction secureagainst this type of attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited

In this paper, we re-visit the problem of unconditionally reliable message transmission (URMT) and unconditionally secure message transmission (USMT) in a directed network under the presence of a threshold adaptive Byzantine adversary, having unbounded computing power. Desmedt et.al [5] have given the necessary and sufficient condition for the existence of URMT and USMT protocols in directed ne...

متن کامل

Unconditionally Secure Anonymous Encryption and Group Authentication

Anonymous channels or similar techniques that can achieve sender’s anonymity play important roles in many applications. However, they will be meaningless if cryptographic primitives containing his identity is carelessly used during the transmission. The main contribution of this paper is to study the security primitives for the above problem. In this paper, we first define unconditionally secur...

متن کامل

Some Bounds and a Construction for Secure Broadcast Encryption

We rst present two tight lower bounds on the size of the secret keys of each user in an unconditionally secure one-time use broadcast encryption scheme (OTBES). Then we show how to construct a computa-tionally secure multiple-use broadcast encryption scheme (MBES) from a key predistribution scheme (KPS) by using the ElGamal cryptosystem. We prove that our MBES is secure against chosen (message,...

متن کامل

Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution

In 1993, Beimel and Chor presented an unconditionally secure interactive protocol which allows a subset of users in a network to establish a common key. This scheme made use of a key predistribution scheme due to Blom. In this paper, we describe some variations and generalizations of the Beimel-Chor scheme, including broadcast encryption schemes as well as interactive key distribution schemes. ...

متن کامل

Further Results on Asymmetric Authentication Schemes

This paper derives some further results on unconditionally secure asym-metric authentication schemes. It starts by giving a general framework for constructing A 2-codes, identifying many known constructions as special cases. Then a full treatment of A 3-codes (A 2-codes protecting against arbiter's attacks) is given, including bounds on the parameters and optimal constructions. With these model...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016