Skip to main navigation Skip to search Skip to main content

Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts

Research output: Contribution to journalArticlepeer-review

Abstract

We consider designing public-key broadcast encryption schemes with constant-size secret keys and ciphertexts, achieving chosen-ciphertext security. We first argue that known CPA-to-CCA transforms currently do not yield such schemes. We then propose a scheme, modifying a previous selective CPA secure proposal by Boneh, Gentry, and Waters. Our scheme has constant-size secret keys and ciphertexts, and we prove that it is selective chosen-ciphertext secure based on standard assumptions. Our scheme has ciphertexts that are shorter than those of the previous CCA secure proposals. Then, we propose a second scheme that provides the functionality of both broadcast encryption and revocation schemes simultaneously using the same set of parameters. Finally, we show that it is possible to prove our first scheme adaptive chosen-ciphertext secure under reasonable extensions of the bilinear Diffie-Hellman exponent and the knowledge-of-exponent assumptions. We prove both of these extended assumptions in the generic group model. Hence, our scheme becomes the first to achieve constant-size secret keys and ciphertexts (both asymptotically optimal) and adaptive chosen-ciphertext security at the same time.

Original languageEnglish
Pages (from-to)251-265
Number of pages15
JournalInternational Journal of Information Security
Volume12
Issue number4
DOIs
Publication statusPublished - 1 Aug 2013

Keywords

  • Adaptive CCA security
  • Broadcast encryption
  • GBDHE assumption
  • Knowledge-of-exponent assumption
  • Public-key cryptography
  • Revocation scheme

Fingerprint

Dive into the research topics of 'Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts'. Together they form a unique fingerprint.

Cite this