2016中国计算机应用大会遴选论文

基于多线性映射的低开销BEPM方案

展开
  • 武警工程大学 电子技术系, 西安 710086
杨晓元,教授,博导,研究方向:信息安全、密码学,E-mail:xyyangwj@126.com

收稿日期: 2016-10-02

  修回日期: 2016-12-05

  网络出版日期: 2017-09-30

基金资助

国家自然科学基金(No.61272492,No.61572521)资助

Low Overhead Broadcast Encryption with Personalized Message Based on Multilinear Maps

Expand
  • Department of Electronic Technology, Engineering College of CAPF, Xi'an 710086, China

Received date: 2016-10-02

  Revised date: 2016-12-05

  Online published: 2017-09-30

摘要

针对目前带个人信息的广播加密(broadcast encryption with personalized message,BEPM)方案参数过大的问题,综合利用广播加密与密钥封装方法及多线性映射的特性,构造了一种低开销的BEPM方案,其密文长度与用户的私钥长度均为常数,公钥长度仅为O(lb N).该方案具有完全抗合谋攻击的特性与标准模型下的选择明文安全性,且加解密效率高,可应用于付费电视等诸多领域.

本文引用格式

吕立群, 杨晓元, 汪晶晶, 程璐 . 基于多线性映射的低开销BEPM方案[J]. 应用科学学报, 2017 , 35(5) : 626 -633 . DOI: 10.3969/j.issn.0255-8297.2017.05.008

Abstract

Current schemes of broadcast encryption with personalized message (BEPM) require exceedingly large parameters. To deal with the problem, a low-overhead BEPM scheme is constructed by comprehensively using broadcast encryption, key encapsulation, and characteristics of multilinear maps. The ciphertext and private key size of each user are constant, and the public key size is only in the order of O(lb N). The proposed scheme is also fully collusion resistant and can achieve chosen plaintext completely in the standard model. The scheme is safe and effective, and widely applicable in many felds such as pay TV.

参考文献

[1] Fiat A, Naor M. Broadcast encryption[C]//Annual International Cryptology Conference. Berlin Heidelberg:Springer, 1993:480-491.
[2] Zou X, Xiang J. Dynamic broadcast encryption scheme with revoking user[J]. Wuhan University Journal of Natural Sciences, 2013, 18(6):499-503.
[3] Ohtake G, Hanaoka G, Ogawa K. Efcient broadcast encryption with personalized messages[C]//International Conference on Provable Security. Berlin Heidelberg:Springer, 2010:214-228.
[4] Yoshimura T. Conditional access system for digital broadcasting in Japan[J]. Proceedings of the IEEE, 2006, 94(1):318-322.
[5] Dodis Y, Fazio N. Public key broadcast encryption for stateless receivers[C]//ACM Workshop on Digital Rights Management. Berlin Heidelberg:Springer, 2002:61-80.
[6] Dodis Y, Fazio N. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack[J]. Lecture Notes in Computer Science, 2003, 2567:100-115.
[7] Goodrich M T, Sun J Z, Tamassia R. Efcient tree-based revocation in groups of low-state devices[C]//Annual International Cryptology Conference. Berlin Heidelberg:Springer, 2004:511-527.
[8] Halevy D, Shamir A. The LSD broadcast encryption scheme[J]. Lecture Notes in Computer Science, 2002, 2442:47-60.
[9] Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys[C]//Annual International Cryptology Conference. Berlin Heidelberg:Springer, 2005:258-275.
[10] Boneh D, Waters B, Zhandry M. Low overhead broadcast encryption from multilinear maps[C]//International Cryptology Conference. Berlin Heidelberg:Springer, 2014:206-223.
[11] Delerablée C. Identity-based broadcast encryption with constant size ciphertexts and private keys[C]//International Conference on the Theory and Application of Cryptology and Information Security. Berlin Heidelberg:Springer, 2007:200-215.
[12] Ren Y, Wang S, Zhang X. Non-interactive dynamic identity-based broadcast encryption without random oracles[C]//International Conference on Information and Communications Security. Berlin Heidelberg:Springer, 2012:479-487.
[13] Park S, Lee K, Lee D H. New constructions of revocable identity-based encryption from multilinear maps[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(8):1564-1577.
[14] Xu K, Liao Y, Qiao L, Liu Z, Yang X. An identity-based (IDB) broadcast encryption scheme with personalized messages (BEPM)[J]. PloS one, 2015, 10(12):e0143975.

文章导航

/