Skip to main content
Log in

A scalable encryption scheme for multi-privileged group communications

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In multi-privileged group communications, since users, who can subscribe to different data streams according to their interests, have multiple access privileges, security issues are more difficult to be solved than those in traditional group communications. The common drawback of traditional key management schemes is that they will result in the “one-affect-many” problem, because they use a key graph to manage all the keys in a group, which makes one key being shared by many users. Recently, a key-policy attribute-based encryption (KP-ABE) scheme is proposed to encrypt messages to multiple users efficiently, which has been applied in secure multi-privileged group communications. However, user revocation in KP-ABE is still not resolved when applied to multi-privileged group communications. So, in this paper, by uniquely combining a collusion-resistant broadcast encryption system and a KP-ABE system with a non-monotone access structure, we propose a scalable encryption scheme for multi-privileged group communications (EMGC). Based on the features of different multi-privileged group communication systems, we also propose two constructions for our EMGC scheme. With the two constructions, a system can support a user not only to join/leave a group at will, but also to change his access privilege on demand, and the expenses during rekeying operations are small. Therefore, our scheme, which can accommodate a dynamic group of users, is more applicable to multi-privileged group communications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Attrapadung N, Imai H (2009) Conjunctive broadcast and attribute-based encryption. In: Proceedings of pairing. LNCS, vol. 5671, pp 248–265

    Google Scholar 

  2. Beimel A (1996) Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel

  3. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE S&P 2007, pp 321–334

    Google Scholar 

  4. Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Proceedings of CRYPTO 2005. LNCS, vol 3621, pp 258–275

    Google Scholar 

  5. Chang I, Engel R, Kandlur D, Pendarakis D, Saha D (1999) Key management for secure Internet multicast using boolean function minimization techniques. In: Proceedings of IEEE INFOCOM 1999, pp 689–698

    Google Scholar 

  6. Cheon JH, Lee DH (2009) A note on self-bilinear maps. J Korean Math Soc 46(2):303–309

    Article  MathSciNet  MATH  Google Scholar 

  7. Cheung L, Cooley JA, Khazan R, Newport C, (2007) Collusion-resistant group key management using attribute-based encryption. Cryptology ePrint Archive Report

  8. Goyal V, Pandey O, Sahai A, Waters B (2005) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM CCS 2005, pp 89–98

    Google Scholar 

  9. Junod P, Karlov A (2010) An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies. In: Proceedings of DRM 2010, pp 13–24

    Google Scholar 

  10. Lewko A, Sahai A, Waters B (2010) Revocation systems with very small private keys. In: Proceedings of IEEE S&P 2010, pp 273–285

    Google Scholar 

  11. Li R, Li J, Kameda H (2005) Distributed hierarchical access control for secure group communications. In: Proceedings of ICCNMC 2005. LNCS, vol 3619, pp 539–548

    Google Scholar 

  12. Lubicz D, Sirvent T (2008) Attribute-based broadcast encryption scheme made efficient. In: Proceedings of AfricaCrypt 2008, pp 325–342

    Chapter  Google Scholar 

  13. Hur J, Noh DK (2010) Attribute-based access control with efficient revocation in data outsourcing systems IEEE Trans Parallel Distrib Syst 99:1–8

    Google Scholar 

  14. Ostrovsky R, Sahai A, Waters B (2007) Attribute based encryption with non-monotonic access structure. In: Proceedings of ACM CCS 2007, pp 195–203

    Google Scholar 

  15. Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329

    Article  Google Scholar 

  16. Sun Y, Liu KJR (2004) Scalable hierarchical access control in secure group communications. In: Proceedings of IEEE INFOCOM 2004, pp 1296–1306

    Chapter  Google Scholar 

  17. Wang G, Ouyang J, Chen H-H, Guo M (2007) Efficient group key management for multi-privileged groups. Comput Commun 30(11–12):2497–2509

    Article  Google Scholar 

  18. Zhao W, Liu C, Ye D (2008) Provably secure convertible nominative signature scheme. In: Proceedings of INSCRYPT 2008. LNCS, vol 5487, pp 23–40

    Google Scholar 

  19. Zhou Z, Huang D (2010) Constructing efficient attribute-based broadcast encryption. In: Proceedings of IEEE INFOCOM 2010, pp 1–2

    Chapter  Google Scholar 

  20. Zhou Z, Huang D (2010) On efficient ciphertext-policy attribute based encryption and broadcast encryption. In: Proceedings of ACM CCS 2010, pp 753–755

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang.

Additional information

A preliminary version of this paper appears in Proceedings of the 2010 IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010), in conjunction with the 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-10), Hong Kong, pp. 597–602, December 11–13, 2010. This improved paper gives more efficient constructions, which can reduce the computational overhead of users.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, G., Du, Q., Zhou, W. et al. A scalable encryption scheme for multi-privileged group communications. J Supercomput 64, 1075–1091 (2013). https://doi.org/10.1007/s11227-011-0683-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-011-0683-4

Keywords

Navigation