Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy
نویسندگان
چکیده
Multireceiver encryption enables a sender to encrypt a message and transmit the ciphertext to a set of authorized users while no one outside this set can decrypt the message, which is known as an efficient protocol to achieve a secure multicast data communication among multiple authorized users. In this work, we construct two identitybased multireceiver encryption schemes (one is based on composite order groups whose order is a product of three primes and the other is based on prime order of asymmetric bilinear groups where the isomorphisms between two groups are not efficiently computable) that support: (1)unbounded recipient in multireceiver set that does not pre-establish the maximum number of multireceiver users in advance in the setup algorithm; (2)identity privacy that no one outside the multireceiver set can derive the identities of multireceiver users, and (3)higher computing and communicating performance, i.e., short ciphertexts, fixlength public parameters and constant keys. The security analysis, including semantic security and identity privacy, are presented in selective security model under the mathematical assumptions of (bilinear) subgroup decisional problems in composite order model and decisional BDH problems in prime order of asymmetric bilinear groups in the standard model.
منابع مشابه
New Identity-based Broadcast Encryption with Constant Ciphertexts in the Standard Model
How to build an efficient identity-based broadcast system with short ciphertexts is a main challenge at present. The existing constructions with constant size ciphertexts in the standard model are based on the non-standard cryptography assumption. In addition, these constructions cannot solve the trade-off between the private keys and ciphertexts. Hence these methods lead to schemes that are so...
متن کاملAchieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
In this paper, we present two non-zero inner-product encryption (NIPE) schemes that are adaptively secure under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. One of the proposed NIPE schemes features constant-size ciphertexts and the other features constant-size secret-keys. Our NIPE schemes imply an identity-based revocation (IBR) system with constant-s...
متن کاملForward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
We introduce a primitive called Hierarchical Identity-Coupling Broadcast Encryption (HICBE) that can be used for constructing efficient collusion-resistant public-key broadcast encryption schemes with extended properties such as forward-security and keyword-searchability. Our forward-secure broadcast encryption schemes have small ciphertext and private key sizes, in particular, independent of t...
متن کاملAnonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Based Encryption (HIBE) schemes is useful primitives that can be applicable to searchable encryptions [4], such as ID-based searchable encryption, temporary searchable encryption [1], and anonymous for...
متن کاملPrivate Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
Private functional encryption guarantees that not only the information in ciphertexts is hidden but also the circuits in decryption tokens are protected. A notable use case of this notion is query privacy in searchable encryption. Prior privacy models in the literature were fine-tuned for specific functionalities (namely, identity-based encryption and inner-product encryption), did not model co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 14 شماره
صفحات -
تاریخ انتشار 2012