Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We consider designing broadcast encryption schemes with constant-size secret keys and ciphertexts, achieving chosen-ciphertext security. We first argue that known CPA-to-CCA transforms currently do not yield such schemes. We then propose a scheme, modifying a previous selective CPA secure proposal by Boneh, Gentry, and Waters. Our proposed scheme has constant-size secret keys and ciphertexts and we prove that it is selective chosen-ciphertext secure based on standard assumptions. Our scheme has ciphertexts that are shorter than those of the previous CCA secure proposals. Then we propose a second scheme that provides the functionality of both broadcast encryption and revocation schemes simultaneously using the same set of parameters. Finally we show that it is possible to prove our first scheme adaptive chosen-ciphertext secure under reasonable extensions of the bilinear Diffie-Hellman exponent and the knowledge of exponent assumptions. We prove both of these extended assumptions in the generic group model. Hence, our scheme becomes the first to achieve constant-size secret keys and ciphertexts (both asymptotically optimal) and adaptive chosen-ciphertext security at the same time.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 17th Australasian Conference, ACISP 2012, Proceedings
PublisherSpringer Verlag
Pages308-321
Number of pages14
ISBN (Print)9783642314476
DOIs
Publication statusPublished - 1 Jan 2012
Event17th Australasian Conference on Information Security and Privacy, ACISP 2012 - Wollongong, NSW, Australia
Duration: 9 Jul 201211 Jul 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7372 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference17th Australasian Conference on Information Security and Privacy, ACISP 2012
Country/TerritoryAustralia
CityWollongong, NSW
Period9/07/1211/07/12

Fingerprint

Dive into the research topics of 'Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts'. Together they form a unique fingerprint.

Cite this