Multi-recipient Encryption in Heterogeneous Setting
نویسندگان
چکیده
This paper presents an efficient method for securely broadcasting a message to multiple recipients in a heterogeneous environment where each recipient is allowed to choose his or her preferred secure encryption scheme independently of other recipients’ choices. Previous work pertinent to this direction of research, namely multi-recipient encryption scheme (MRES), generally requires all recipients adhere to the same public key encapsulation mechanism (KEM) for the sake of delivering promised savings in computation and bandwidth via randomness reuse. Our work eliminates the requirement of using the same KEM by all recipients, whereby removing a practical barrier to the adoption of MRES in real world applications. A second advantage is the method’s capability to cope with a dynamically changing group of recipients where old recipients may be deleted and new recipients may be added, while ensuring the security of messages shared in future. Additional features of our method include decryption by a sender, anonymity of recipients and stateful key encapsulation which significantly reduces computational costs for securely transmitting or sharing new messages. All these attributes would be useful in building applications for secure data sharing in a cloud computing environment.
منابع مشابه
Extensions of Public-Key, Identity-Based and Certificateless Encryption Schemes
In this work, we first study extensions and applications of the identity-based encryption (IBE) primitive, focusing on generic constructions. We first define what is meant by an identity-based key encapsulation mechanism before extending it to the multi-recipient setting. We then propose an efficient multi-recipient scheme based on bilinear maps and then move on to investigate the properties of...
متن کاملModelling the Heterogeneous Price Setting Behavior of Firms (DSGE Approach)
Despite the empirical evidence of the difference in the degree of price stickiness of goods and services, in the new standard Keynesian models, the same price stickiness is considered for all firms producing intermediate goods. In recent years, a new generation of pricing models has been introduced to simulate the heterogeneous price setting behavior in which, unlike standard pricing models, th...
متن کاملAn Asymmetric Multi-Recipient Encryption Scheme
Multi-recipient encryption schemes have many advantages such as high efficiency, low network cost, and flexible object control. An asymmetric multi-recipient encryption scheme with indistinguishability under chosen-ciphertext attack is proposed. The encryption scheme uses an eighth order linear feedback shift register. The main features of this scheme are small size of ciphertext and the overal...
متن کاملA Novel (t,n) Threshold Convertible Authenticated Encryption Scheme
Authenticated encryption schemes allow the signer to generate an authenticated ciphertext such that only the designated recipient has the ability to recover the message and verify its corresponding signature. It can be seen that authenticated encryption schemes are applicable to lots of E-Commerce applications like credit card transactions, since these schemes simultaneously fulfill the securit...
متن کاملMultiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails
Efficiently protecting the privacy of multi-recipient emails is not as trivial as it seems. The approach proposed by S/MIME is to concatenate all ciphertexts. However, it suffers from poor scalability due to its linear computation and communication cost. In this paper, we propose a new practical and secure scheme, called multiplex encryption. By combining the ideas of identity-based mediated RS...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014