To give concurrent consideration both
the efficiency and the security (intensity of intractable problem)
in the standard model, a chosen ciphertext secure identity-based
broadcast encryption is proposed. Against the chosen ciphertext
security model, by using identity (ID) sequence and adding
additional information in ciphertext, the self-adaptive chosen
identity security (the full security) and the chosen ciphertext
security are gained simultaneously. The reduction of scheme's
security is the decisional bilinear Diffie-Hellman (BDH) intractable
assumption, and the proof of security shows that the proposed scheme
is indistinguishable against adaptive chosen ciphertext attacks in
the standard model under the decisional BDH intractable assumption.
So the security level is improved,and it is suitable for higher
security environment.
SUN Jin (孙 瑾), HU Yu-pu (胡予濮), ZHANG Le-you (张乐友)
. Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model[J]. Journal of Shanghai Jiaotong University(Science), 2011
, 16(6)
: 672
-676
.
DOI: 10.1007/s12204-011-1209-1
[1] Fiat A, Naor M. Broadcast encryption [C]// Advances in Cryptology CRYPTO'93. Berlin, Germany: Springer-Verlag, 1993: 480-491.
[2] Zhang Y L, Zhang Y K, Zhang J. An ID-based broadcast encryption scheme for collaborative design [C]// International Conference on Networks Security, Wireless Communications and Trusted Computing. Wuhan, China: IEEE Computer Society, 2009:
699-702.
[3] Delerablee C, Paillier P, Pointcheval D. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys [C]// Proceedings of the First International Conference on Pairing-Based Cryptography. Heidelberg, Germany: Springer-Verlag, 2007: 39-59.
[4] Hu L, Liu Z L, Cheng X H. Efficient identity-based broadcast encryption without random oracles [J]. Journal of Computers, 2010, 5 (3): 331-336.
[5] Yu G, Ma X, Shen Y, et al. Provable secure identity based generalized signcryption scheme [J]. Theoretical Computer Science, 2010, 411 (42): 3614-3624.
[6] Zhang L Y, Hu Y P, Mu N B. An identity-based broadcast encryption protocol
for Ad Hoc networks [C]// Proceedings of the 9th International
Conference for Young Computer Scientists. Changsha, China: IEEE
Computer Society, 2008: 1619-1623.
[7] Liu Z H, Hu Y P, Ma H. Secure proxy multi-signature scheme in the
standard model [C]// Proceedings of the Second International Conference. Berlin, Germany: Springer-Verlag, 2008: 124-140.
[8] Waters B. Efficient identity based encryption without random oracles
[C]// Advances in Cryptology Eurocrypt 2005. Berlin, Germany: Springer-Verlag, 2005: 114-127.
[9] Barbosa M, Farshim P. Efficient identity- based key encapsulation to
multiple parties [C]// Cryptography and Coding. Berlin, Germany: Springer-Verlag, 2005: 428-441.
[10] Park J H, Lee D H. Security analysis of a multi-receiver identity-based
key encapsulation mechanism [J]. IEICE Transactions on
Fundamentals, 2009, E92-A (1): 329-331.
[11] Chen L, Malone Lee J. Improved identity-based
signcryption [C]// Proceedings of the Eighth International
Workshop on Theory and Practice in Public Key Cryptography. Berlin,
Germany: Springer-Verlag, 2005: 362-379.
[12] Boneh D, Franklin M. Identity-based encryption form the Weil pairing
[C]// Advances in Cryptology-CRYPTO'2001. Berlin, Germany: Springer-Verlag, 2001: 213-229.