Recipient Revocable Broadcast Encryption with Dealership

  • Joon Sik Kim
  • Youngkyung Lee
  • Jieun Eom
  • Dong Hoon Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10779)

Abstract

The broadcast encryption with dealership (BED) scheme allows a dealer, instead of a broadcaster, to manage a recipient. Unlike prior broadcast encryption schemes, BED reduces the burden placed on the broadcaster to manage recipient, which makes it suitable for a broadcasting service targeting a large number of recipients. Subscribing and unsubscribing from the broadcast service occur frequently at the request of the user, however, early versions of BED schemes do not support recipient revocation. In this paper, we propose a recipient revocable broadcast encryption with dealership and show that it is secure in the adaptive security model without random oracles.

Keywords

Broadcast encryption with dealership Adaptive security Revocation Chosen plaintext attack 

References

  1. 1.
    Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248–265. Springer, Heidelberg (2009).  https://doi.org/10.1007/978-3-642-03298-1_16 CrossRefGoogle Scholar
  2. 2.
    Acharya, K., Dutta, R.: Secure and efficient construction of broadcast encryption with dealership. In: Chen, L., Han, J. (eds.) ProvSec 2016. LNCS, vol. 10005, pp. 277–295. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-47422-9_16 Google Scholar
  3. 3.
    Acharya, K., Dutta, R.: Adaptively secure broadcast encryption with dealership. In: Hong, S., Park, J.H. (eds.) ICISC 2016. LNCS, vol. 10157, pp. 161–177. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-53177-9_8 CrossRefGoogle Scholar
  4. 4.
    Acharya, K., Dutta, R.: Adaptively secure recipient revocable broadcast encryption with constant size ciphertext. https://eprint.iacr.org/2017/059.pdf
  5. 5.
    Barth, A., Boneh, D., Waters, B.: Privacy in encrypted content distribution using private broadcast encryption. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 52–64. Springer, Heidelberg (2006).  https://doi.org/10.1007/11889663_4 CrossRefGoogle Scholar
  6. 6.
    Boneh, D., Waters, B.: A fully collusion resistant broadcast, trace, and revoke system. In: Proceedings of ACM Computer and Communications Security 2006, pp. 211–220 (2006)Google Scholar
  7. 7.
    Camacho, P.: Fair exchange of short signatures without trusted third party. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 34–49. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-36095-4_3 CrossRefGoogle Scholar
  8. 8.
    Delerablée, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 200–215. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-76900-2_12 CrossRefGoogle Scholar
  9. 9.
    Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994).  https://doi.org/10.1007/3-540-48329-2_40 CrossRefGoogle Scholar
  10. 10.
    Furukawa, J., Attrapadung, N.: Fully collusion resistant black-box traitor revocable broadcast encryption with short private keys. In: Arge, L., Cachin, C., Jurdziński, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol. 4596, pp. 496–508. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-73420-8_44 CrossRefGoogle Scholar
  11. 11.
    Gritti, C., Susilo, W., Plantard, T., Liang, K., Wong, D.S.: Broadcast encryption with dealership. Int. J. Inf. Secur. 15(3), 271–283 (2016)CrossRefGoogle Scholar
  12. 12.
    Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-44647-8_3 CrossRefGoogle Scholar
  13. 13.
    Phuong, T.V.X., Yang, G., Susilo, W., Chen, X.: Attribute based broadcast encryption with short ciphertext and decryption key. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 252–269. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-24177-7_13 CrossRefGoogle Scholar
  14. 14.
    Ren, Y., Wang, S., Zhang, X.: Non-interactive dynamic identity-based broadcast encryption without random oracles. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 479–487. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-34129-8_47 CrossRefGoogle Scholar
  15. 15.
    Susilo, W., Chen, R., Guo, F., Yang, G., Mu, Y., Chow, Y.: Recipient revocable identity-based broadcast encryption. In: ASIA CCS 2016, pp. 201–210 (2016)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Joon Sik Kim
    • 1
  • Youngkyung Lee
    • 1
  • Jieun Eom
    • 1
  • Dong Hoon Lee
    • 1
  1. 1.Graduate School of Information SecurityKorea UniversitySeoulKorea

Personalised recommendations