期刊文献+

Dynamic Broadcast Encryption Scheme with Revoking User 被引量:2

Dynamic Broadcast Encryption Scheme with Revoking User
原文传递
导出
摘要 Currently, there still lacks an efficient methodology to revoke user's ability to decrypt ciphertext in broadcast encryption with the uncertain number of ciphertext recipients. To solve this problem, here, we present a dynamic broadcast encryption scheme with the following properties: First, the length of the ciphertext has a linear relationship with the number of revocable users, but it has no association with the total number of ciphertext recipients. Sec- ond, the scheme also works when users dynamically join. Espe- cially, compared with methods published up to date, our scheme is more efficient with a large number of ciphertext recipients. Third, the broadcaster can revoke user's ability to decrypt ciphertext if necessary. Fourth, the private key of users is composed of three elements in Elliptic curve group of prime order. Last, if q-Deci- sional Multi-Exponent Bilinear Diffie-Hellman assumption holds, our scheme is secure in the standard model when a polynomial time adversary selectively attacks it. Currently, there still lacks an efficient methodology to revoke user's ability to decrypt ciphertext in broadcast encryption with the uncertain number of ciphertext recipients. To solve this problem, here, we present a dynamic broadcast encryption scheme with the following properties: First, the length of the ciphertext has a linear relationship with the number of revocable users, but it has no association with the total number of ciphertext recipients. Sec- ond, the scheme also works when users dynamically join. Espe- cially, compared with methods published up to date, our scheme is more efficient with a large number of ciphertext recipients. Third, the broadcaster can revoke user's ability to decrypt ciphertext if necessary. Fourth, the private key of users is composed of three elements in Elliptic curve group of prime order. Last, if q-Deci- sional Multi-Exponent Bilinear Diffie-Hellman assumption holds, our scheme is secure in the standard model when a polynomial time adversary selectively attacks it.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2013年第6期499-503,共5页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China(60903175 60703048) the Natural Science Foundation of Hubei Province(2009CBD307 2008CDB352)
关键词 dynamic broadcast encryption revoking user bilin-ear map public key encryption dynamic broadcast encryption revoking user bilin-ear map public key encryption
  • 相关文献

参考文献13

  • 1Fiat A, Naor M. Broadcast encryption [C]//Advances in Cryp- tology CRYPTO'93. New York: Springer-Verlag, 1994: 480- 491.
  • 2Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers [C]//Advances in Cryptologv--CRYPTO 2001. New York: Springer-Verlag, 2001: 41-62.
  • 3Halevy D, Shamir A. The LSD broadcast encryption scheme [C]//Advances in Cryptology-CRYPTO 2002. New York: Springer-Verlag, 2002: 145-161.
  • 4Goodrich M T, Sun J Z, Tamassia R. Efficient tree-based revo- cation in groups of low-state devices [C]//Advances in Cryp- tology--CRYPTO 2004. New York: Springer-Verlag, 2004: 511-527.
  • 5Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys [C]//Ad- vances in Cryptology-CRYPTO 2005. New York: Springer- Verlag, 2005: 258-275.
  • 6Lewko A, Sahai A, Waters B. Revocation systems with very small private keys [C]// Security and Privacy (SP), 2010 1EEE Symposium on Communication, Networking & Broad- casting. Washington D C: IEEE Press, 2010: 273-285.
  • 7Delerablre C, Paillier P, Pointcheval D. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys [C]//Pairing-Based Cryptography--Pairing 2007. New York: Springer-Verlag, 2007: 39-59.
  • 8Phan D H, Pointcheval D, Shahandashti S F, et al. Adaptive cca broadcast encryption with constant-size secret keys and cipher- texts [C]//Information Security and Privacy-ACISP 2012. New York: Springer-Verlag, 2012: 308-321.
  • 9Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers [C]//Advances in Cryptologv-CRYPTO 2001. New York: Springer-Verlag, 2001: 41-62.
  • 10Asano T. A revocation scheme with minimal storage at receiv- ers [C]//Advances in CryptoloD,-ASIACRYPT 2002. New York: Springer-Verlag, 2002: 433-450.

同被引文献1

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部