Decentralized dynamic broadcast encryption

Duong Hieu Phan, David Pointcheval, Mario Strefler

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A broadcast encryption system generally involves three kinds of entities: the group manager that deals with the membership, the encryptor that encrypts the data to the registered users according to a specific policy (the target set), and the users that decrypt the data if they are authorized by the policy. Public-key broadcast encryption can be seen as removing this special role of encryptor, by allowing anybody to send encrypted data. In this paper, we go a step further in the decentralization process, by removing the group manager: the initial setup of the group, as well as the addition of further members to the system, do not require any central authority. Our construction makes black-box use of well-known primitives and can be considered as an extension to the subset-cover framework. It allows for efficient concrete instantiations, with parameter sizes that match those of the subset-cover constructions, while at the same time achieving the highest security level in the standard model under the DDH assumption.

Original languageEnglish
Title of host publicationSecurity and Cryptography for Networks - 8th International Conference, SCN 2012, Proceedings
Pages166-183
Number of pages18
DOIs
Publication statusPublished - 1 Oct 2012
Externally publishedYes
Event8th International Conference on Security and Cryptography for Networks, SCN 2012 - Amalfi, Italy
Duration: 5 Sept 20127 Sept 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7485 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Conference on Security and Cryptography for Networks, SCN 2012
Country/TerritoryItaly
CityAmalfi
Period5/09/127/09/12

Fingerprint

Dive into the research topics of 'Decentralized dynamic broadcast encryption'. Together they form a unique fingerprint.

Cite this