×

zbMATH — the first resource for mathematics

A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption. (English) Zbl 1390.94829
Summary: Standard Broadcast Encryption (BE) and Attribute-Based Encryption (ABE) aim at sending a content to a large arbitrary group of users at once. Regarding Broadcast Encryption, currently, the most efficient schemes provide constant-size headers, that encapsulate ephemeral session keys under which the payload is encrypted. However, in practice, and namely for pay-TV, providers have to send various contents to different groups of users. Headers are thus specific to each group, one for each channel: as a consequence, the global overhead is linear in the number of channels. Furthermore, when one wants to zap to and watch another channel, one has to get the new header and decrypt it to learn the new session key: either the headers are sent quite frequently or one has to store all the headers, even if one watches one channel only. Otherwise, the zapping time becomes unacceptably long. We consider the encapsulation of several ephemeral keys, for various groups and thus various channels, in one header only, and we call this new primitive Multi-Channel Broadcast Encryption or MCBE: one can hope for a much shorter global overhead and a much shorter zapping time since the decoder already has the information to decrypt any available channel at once. Regarding Attribute-Based Encryption, a scheme with constant-size ciphertext is still a challenging task.
In this paper, we introduce a new technique of optimizing the ciphertext-size for both MCBE and ABE schemes.

MSC:
94A60 Cryptography
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] Abe, Masayuki; Groth, Jens; Ohkubo, Miyako; Tango, Takeya, Converting cryptographic schemes from symmetric to asymmetric bilinear groups, (Garay, Juan A.; Gennaro, Rosario, Advances in Cryptology - CRYPTO 2014, Part I, Santa Barbara, CA, USA, August 17-21, 2014, Lecture Notes in Computer Science, vol. 8616, (2014), Springer Heidelberg, Germany), 241-260 · Zbl 1343.94036
[2] Agrawal, Shashank; Chase, Melissa, A study of pair encodings: predicate encryption in prime order groups, (Kushilevitz, Eyal; Malkin, Tal, TCC 2016-A: 13th Theory of Cryptography Conference, Part II, Tel Aviv, Israel, January 10-13, 2016, Lecture Notes in Computer Science, vol. 9563, (2016), Springer Heidelberg, Germany), 259-288 · Zbl 1377.94025
[3] Agrawal, Shashank; Chase, Melissa, Simplifying design and analysis of complex predicate encryption schemes, (Coron, Jean-Sébastien; Nielsen, Jesper Buus, Advances in Cryptology - EUROCRYPT 2017, Part I, Paris, France, May 8-12, 2017, Lecture Notes in Computer Science, vol. 10210, (2017), Springer Heidelberg, Germany), 627-656 · Zbl 1411.94045
[4] Attrapadung, Nuttapong, Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more, (Nguyen, Phong Q.; Oswald, Elisabeth, Advances in Cryptology - EUROCRYPT 2014, Copenhagen, Denmark, May 11-15, 2014, Lecture Notes in Computer Science, vol. 8441, (2014), Springer Heidelberg, Germany), 557-577 · Zbl 1327.94028
[5] Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota, Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs, (Iwata, Tetsu; Cheon, Jung Hee, Advances in Cryptology - ASIACRYPT 2015, Part I, Auckland, New, Zealand, November 30-December 3, 2015, Lecture Notes in Computer Science, vol. 9452, (2015), Springer Heidelberg, Germany), 575-601 · Zbl 1380.94070
[6] Bellare, Mihir; Rogaway, Phillip, Random oracles are practical: a paradigm for designing efficient protocols, (Ashby, V., ACM CCS 93: 1st Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993, (1993), ACM Press), 62-73 · Zbl 0968.90527
[7] Boneh, Dan; Boyen, Xavier; Goh, Eu-Jin, Hierarchical identity based encryption with constant size ciphertext, (Cramer, Ronald, Advances in Cryptology - EUROCRYPT 2005, Aarhus, Denmark, May 22-26, 2005, Lecture Notes in Computer Science, vol. 3494, (2005), Springer Heidelberg, Germany), 440-456 · Zbl 1137.94340
[8] Boneh, Dan; Gentry, Craig; Waters, Brent, Collusion resistant broadcast encryption with short ciphertexts and private keys, (Shoup, Victor, Advances in Cryptology - CRYPTO 2005, Santa Barbara, CA, USA, August 14-18, 2005, Lecture Notes in Computer Science, vol. 3621, (2005), Springer Heidelberg, Germany), 258-275 · Zbl 1145.94434
[9] Canard, S.; Trinh, V. C., Constant-size ciphertext attribute-based encryption from multi-channel broadcast encryption, (Ray, I.; Gaur, M.; Conti, M.; Sanghi, D.; Kamakoti, V., Information Systems Security, ICISS 2016, Lecture Notes in Computer Science, vol. 10063, (2016), Springer)
[10] Canard, Sébastien; Phan, Duong Hieu; Trinh, Viet Cuong, A new technique for compacting secret key in attribute-based broadcast encryption, (Foresti, Sara; Persiano, Giuseppe, CANS 16: 15th International Conference on Cryptology and Network Security, Milan, Italy, November 14-16, 2016, Lecture Notes in Computer Science, vol. 10052, (2016), Springer Heidelberg, Germany), 594-603 · Zbl 1398.94101
[11] Canard, Sébastien; Phan, Duong Hieu; Trinh, Viet Cuong, An attribute-based broadcast encryption scheme for lightweight devices, IET Inf. Secur., 12, 1, 52-59, (January 2018), Print ISSN 1751-8709, Online ISSN 1751-8717
[12] Chen, Cheng; Chen, Jie; Lim, Hoon Wei; Zhang, Zhenfeng; Feng, Dengguo; Ling, San; Wang, Huaxiong, Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures, (Dawson, Topics in Cryptology - CT-RSA 2013, San Francisco, CA, USA, February 25-March 1, 2013, Lecture Notes in Computer Science, vol. 7779, (2013), Springer Heidelberg, Germany), 50-67 · Zbl 1312.94039
[13] Chen, Cheng; Zhang, Zhenfeng; Feng, Dengguo, Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost, (Boyen, Xavier; Chen, Xiaofeng, ProvSec 2011: 5th International Conference on Provable Security, Xi’an, China, October 16-18, 2011, Lecture Notes in Computer Science, vol. 6980, (2011), Springer Heidelberg, Germany), 84-101 · Zbl 1298.94083
[14] Chen, Jie; Gay, Romain; Wee, Hoeteck, Improved dual system ABE in prime-order groups via predicate encodings, (Oswald, Elisabeth; Fischlin, Marc, Advances in Cryptology - EUROCRYPT 2015, Part II, Sofia, Bulgaria, April 26-30, 2015, Lecture Notes in Computer Science, vol. 9057, (2015), Springer Heidelberg, Germany), 595-624 · Zbl 1375.94109
[15] Delerablée, Cécile, Identity-based broadcast encryption with constant size ciphertexts and private keys, (Kurosawa, Kaoru, Advances in Cryptology - ASIACRYPT 2007, Kuching, Malaysia, December 2-6, 2007, Lecture Notes in Computer Science, vol. 4833, (2007), Springer Heidelberg, Germany), 200-215 · Zbl 1153.94366
[16] Dodis, Yevgeniy; Fazio, Nelly, Public key trace and revoke scheme secure against adaptive chosen ciphertext attack, (Desmedt, Yvo, PKC 2003: 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Lecture Notes in Computer Science, vol. 2567, (2003), Springer Heidelberg, Germany), 100-115 · Zbl 1033.94522
[17] Emura, Keita; Miyaji, Atsuko; Nomura, Akito; Omote, Kazumasa; Soshi, Masakazu, A ciphertext-policy attribute-based encryption scheme with constant ciphertext length, (Bao, Feng; Li, Hui; Wang, Guilin, ISPEC 2009: 5th International Conference on Information Security Practice and Experience, Xi’an, China, April 13-15, 2009, Lecture Notes in Computer Science, vol. 5451, (2009), Springer Heidelberg, Germany), 13-23 · Zbl 1195.94054
[18] Fiat, Amos; Naor, Moni, Broadcast encryption, (Stinson, Douglas R., Advances in Cryptology - CRYPTO’93, Santa Barbara, CA, USA, August 22-26, 1994, Lecture Notes in Computer Science, vol. 773, (1994), Springer Heidelberg, Germany), 480-491 · Zbl 0870.94026
[19] Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent, Attribute-based encryption for circuits from multilinear maps, (Canetti, Ran; Garay, Juan A., Advances in Cryptology - CRYPTO 2013, Part II, Santa Barbara, CA, USA, August 18-22, 2013, Lecture Notes in Computer Science, vol. 8043, (2013), Springer Heidelberg, Germany), 479-499 · Zbl 1311.94080
[20] Ge, Aijun; Zhang, Rui; Chen, Cheng; Ma, Chuangui; Zhang, Zhenfeng, Threshold ciphertext policy attribute-based encryption with constant size ciphertexts, (Susilo, Willy; Mu, Yi; Seberry, Jennifer, ACISP 12: 17th Australasian Conference on Information Security and Privacy, Wollongong, NSW, Australia, July 9-11, 2012, Lecture Notes in Computer Science, vol. 7372, (2012), Springer Heidelberg, Germany), 336-349 · Zbl 1308.94072
[21] Gentry, Craig; Waters, Brent, Adaptive security in broadcast encryption systems (with short ciphertexts), (Joux, Antoine, Advances in Cryptology - EUROCRYPT 2009, Cologne, Germany, April 26-30, 2009, Lecture Notes in Computer Science, vol. 5479, (2009), Springer Heidelberg, Germany), 171-188 · Zbl 1239.94073
[22] Goyal, Vipul; Pandey, Omkant; Sahai, Amit; Waters, Brent, Attribute-based encryption for fine-grained access control of encrypted data, (Juels, Ari; Wright, Rebecca N.; De Capitani di Vimercati, Sabrina, ACM CCS 06: 13th Conference on Computer and Communications Security, Alexandria, Virginia, USA, October 30-November 3, 2006, (2006), ACM Press), 89-98, Available as Cryptology ePrint Archive Report 2006/309
[23] Hamburg, Mike, Spatial encryption, (2011), Cryptology ePrint Archive, Report 2011/389
[24] Herranz, Javier; Laguillaumie, Fabien; Ràfols, Carla, Constant size ciphertexts in threshold attribute-based encryption, (Nguyen, Phong Q.; Pointcheval, David, PKC 2010: 13th International Conference on Theory and Practice of Public Key Cryptography, Paris, France, May 26-28, 2010, Lecture Notes in Computer Science, vol. 6056, (2010), Springer Heidelberg, Germany), 19-34 · Zbl 1271.94021
[25] Junod, Pascal; Karlov, Alexandre, An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies, (Al-Shaer, Ehab; Jin, Hongxia; Joye, Marc, Proceedings of the 10th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010, (2010), ACM), 13-24
[26] Lewko, Allison B.; Okamoto, Tatsuaki; Sahai, Amit; Takashima, Katsuyuki; Waters, Brent, Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption, (Gilbert, Henri, Advances in Cryptology - EUROCRYPT 2010, French Riviera, May 30-June 3, 2010, Lecture Notes in Computer Science, vol. 6110, (2010), Springer Heidelberg, Germany), 62-91 · Zbl 1279.94095
[27] Lewko, Allison B.; Sahai, Amit; Waters, Brent, Revocation systems with very small private keys, (2010 IEEE Symposium on Security and Privacy, Berkeley/Oakland, CA, USA, May 16-19, 2010, (2010), IEEE Computer Society Press), 273-285
[28] Lewko, Allison B.; Waters, Brent, Unbounded HIBE and attribute-based encryption, (Paterson, Kenneth G., Advances in Cryptology - EUROCRYPT 2011, Tallinn, Estonia, May 15-19, 2011, Lecture Notes in Computer Science, vol. 6632, (2011), Springer Heidelberg, Germany), 547-567 · Zbl 1290.94105
[29] Lubicz, David; Sirvent, Thomas, Attribute-based broadcast encryption scheme made efficient, (Vaudenay, Serge, AFRICACRYPT 08: 1st International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Lecture Notes in Computer Science, vol. 5023, (2008), Springer Heidelberg, Germany), 325-342 · Zbl 1142.94351
[30] Malluhi, Qutaibah M.; Shikfa, Abdullatif; Trinh, Viet Cuong, A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption, (Karri, Ramesh; Sinanoglu, Ozgur; Sadeghi, Ahmad-Reza; Yi, Xun, AsiaCCS 2017: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, April 2-6, 2017, (2017), ACM), 230-240
[31] Naor, Dalit; Naor, Moni; Lotspiech, Jeffery, Revocation and tracing schemes for stateless receivers, (Kilian, Joe, Advances in Cryptology - CRYPTO 2001, Santa Barbara, CA, USA, August 19-23, 2001, Lecture Notes in Computer Science, vol. 2139, (2001), Springer Heidelberg, Germany), 41-62 · Zbl 1002.94522
[32] Okamoto, Tatsuaki; Takashima, Katsuyuki, Fully secure unbounded inner-product and attribute-based encryption, (Wang, Xiaoyun; Sako, Kazue, Advances in Cryptology - ASIACRYPT 2012, Beijing, China, December 2-6, 2012, Lecture Notes in Computer Science, vol. 7658, (2012), Springer Heidelberg, Germany), 349-366 · Zbl 1292.94122
[33] Ostrovsky, Rafail; Sahai, Amit; Waters, Brent, Attribute-based encryption with non-monotonic access structures, (Ning, Peng; De Capitani di Vimercati, Sabrina; Syverson, Paul F., ACM CCS 07: 14th Conference on Computer and Communications Security, Alexandria, Virginia, USA, October 28-31, 2007, (2007), ACM Press), 195-203
[34] Phan, D. H.; Pointcheval, D.; Trinh, V. C., Multi-channel broadcast encryption, (Proceedings of the 8th ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS ’13), (2013), ACM Press)
[35] Phan, Duong Hieu; Pointcheval, David; Shahandashti, Siamak Fayyaz; Strefler, Mario, Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts, (Susilo, Willy; Mu, Yi; Seberry, Jennifer, ACISP 12: 17th Australasian Conference on Information Security and Privacy, Wollongong, NSW, Australia, July 9-11, 2012, Lecture Notes in Computer Science, vol. 7372, (2012), Springer Heidelberg, Germany), 308-321 · Zbl 1308.94084
[36] Phan, Duong Hieu; Pointcheval, David; Strefler, Mario, Security notions for broadcast encryption, (Lopez, Javier; Tsudik, Gene, ACNS 11: 9th International Conference on Applied Cryptography and Network Security, Nerja, Spain, June 7-10, 2011, Lecture Notes in Computer Science, vol. 6715, (2011), Springer Heidelberg, Germany), 377-394 · Zbl 1311.94095
[37] Phuong, Tran Viet Xuan; Yang, Guomin; Susilo, Willy; Chen, Xiaofeng, Attribute based broadcast encryption with short ciphertext and decryption key, (Pernul, Günther; Ryan, Peter Y. A.; Weippl, Edgar R., ESORICS 2015: 20th European Symposium on Research in Computer Security, Part II, Vienna, Austria, September 21-25, 2015, Lecture Notes in Computer Science, vol. 9327, (2015), Springer Heidelberg, Germany), 252-269
[38] Rouselakis, Yannis; Waters, Brent, Practical constructions and new proof methods for large universe attribute-based encryption, (Sadeghi, Ahmad-Reza; Gligor, Virgil D.; Yung, Moti, ACM CCS 13: 20th Conference on Computer and Communications Security, Berlin, Germany, November 4-8, 2013, (2013), ACM Press), 463-474
[39] Sahai, Amit; Waters, Brent R., Fuzzy identity-based encryption, (Cramer, Ronald, Advances in Cryptology - EUROCRYPT 2005, Aarhus, Denmark, May 22-26, 2005, Lecture Notes in Computer Science, vol. 3494, (2005), Springer Heidelberg, Germany), 457-473 · Zbl 1137.94355
[40] Waters, Brent, Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions, (Halevi, Shai, Advances in Cryptology - CRYPTO 2009, Santa Barbara, CA, USA, August 16-20, 2009, Lecture Notes in Computer Science, vol. 5677, (2009), Springer Heidelberg, Germany), 619-636 · Zbl 1252.94101
[41] Waters, Brent, Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, (Catalano, Dario; Fazio, Nelly; Gennaro, Rosario; Nicolosi, Antonio, PKC 2011: 14th International Conference on Theory and Practice of Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Lecture Notes in Computer Science, vol. 6571, (2011), Springer Heidelberg, Germany), 53-70 · Zbl 1291.94165
[42] Wee, Hoeteck, Dual system encryption via predicate encodings, (Lindell, Yehuda, TCC 2014: 11th Theory of Cryptography Conference, San Diego, CA, USA, February 24-26, 2014, Lecture Notes in Computer Science, vol. 8349, (2014), Springer Heidelberg, Germany), 616-637 · Zbl 1326.94120
[43] Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru, A framework and compact constructions for non-monotonic attribute-based encryption, (Krawczyk, Hugo, PKC 2014: 17th International Conference on Theory and Practice of Public Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Lecture Notes in Computer Science, vol. 8383, (2014), Springer Heidelberg, Germany), 275-292 · Zbl 1335.94084
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.