TY - JOUR
T1 - Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext
AU - Kim, Jongkil
AU - Susilo, Willy
AU - Au, Man Ho
AU - Seberry, Jennifer
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2015/3/1
Y1 - 2015/3/1
N2 - In this paper, we present an adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext in the standard model. The size of the public key and the private keys of our system are both linear in the maximum number of receivers. In addition, our system is fully collusion-resistant and has stateless receivers. Compared with the state-of-the-art, our scheme is well optimized for the broadcast encryption. The computational complexity of decryption of our scheme depends only on the number of receivers, not the maximum number of receivers of the system. Technically, we employ dual system encryption technique and our proposal offers adaptive security under the general subgroup decisional assumption. Our scheme demonstrates that the adaptive security of the schemes utilizing a composite order group can be proven under the general subgroup decisional assumption, while many existing systems working in a composite order group are secure under multiple subgroup decision assumptions. We note that this finding is of an independent interest, which may be useful in other scenarios.
AB - In this paper, we present an adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext in the standard model. The size of the public key and the private keys of our system are both linear in the maximum number of receivers. In addition, our system is fully collusion-resistant and has stateless receivers. Compared with the state-of-the-art, our scheme is well optimized for the broadcast encryption. The computational complexity of decryption of our scheme depends only on the number of receivers, not the maximum number of receivers of the system. Technically, we employ dual system encryption technique and our proposal offers adaptive security under the general subgroup decisional assumption. Our scheme demonstrates that the adaptive security of the schemes utilizing a composite order group can be proven under the general subgroup decisional assumption, while many existing systems working in a composite order group are secure under multiple subgroup decision assumptions. We note that this finding is of an independent interest, which may be useful in other scenarios.
KW - broadcast encryption
KW - cryptography
KW - identity-based broadcast encryption
KW - public key
UR - http://www.scopus.com/inward/record.url?scp=84923249651&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2014.2388156
DO - 10.1109/TIFS.2014.2388156
M3 - Article
AN - SCOPUS:84923249651
SN - 1556-6013
VL - 10
SP - 679
EP - 693
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 3
M1 - 7001075
ER -