A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption
Broadcast Encryption (BE) schemes allow a sender to efficiently encrypt messages for a large set of receivers. The currently most efficient BE schemes in the stateless receiver scenario are based on symmetric cryptography. However, a variety of business models with mutually mistrusting senders necessitates the use of asymmetric cryptography. We propose a generic framework that allows to transform a large class of symmetric BE schemes into asymmetric schemes, where the transformation employs an arbitrary hierarchical identity based encryption scheme. Applying our framework, we transform a recent symmetric scheme, called layered punctured interval scheme, for which no asymmetric version has yet been published. In addition, we give a formal proof of the chosen ciphertext security of our framework, which allows to generically transform any future symmetric BE scheme within the large class into a chosen-ciphertext-secure asymmetric scheme with the same efficiency measures.
Unable to display preview. Download preview PDF.
- 1.Huber, U., Sadeghi, A.R.: A generic transformation from symmetric to asymmetric broadcast encryption. Technical Report, Horst Görtz Institute for IT Security (2006), http://www.prosec.rub.de/publications
- 2.Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: Issues and architectures. Request for comments (2627), Internet Engineering Task Force (IETF) (1999), URL: ftp.ietf.org/rfc/rfc2627.txt
- 3.4C Entity, LLC: CPPM specification—introduction and common cryptographic elements. Specification Revision 1.0 (2003), URL: http://www.4centity.com/data/tech/spec/cppm-base100.pdf
- 4.AACS Licensing Administrator: Advanced access content system (AACS): Introduction and common cryptographic elements. Specification Revision 0.90 (2005), URL: http://www.aacsla.com/specifications/AACS_Spec-Common_0.90.pdf
- 7.Jho, N.S., Hwang, J.Y., Cheon, J.H., Kim, M.H., Lee, D.H., Yoo, E.S.: One-way chain based broadcast encryption schemes. , pp. 559–574Google Scholar
- 10.Boneh, D., Boyen, X., Goh, E.J.: Hierarchical identity based encryption with constant size ciphertext. , pp. 440–456Google Scholar
- 11.Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)Google Scholar
- 15.Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005)Google Scholar
- 18.Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. , pp. 207–222Google Scholar
- 19.Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. , pp. 223–238Google Scholar