Skip to main content

A New Broadcast Encryption Scheme for Multi Sets

  • Conference paper
  • First Online:
  • 1375 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 6))

Abstract

Broadcasters use broadcast encryption to broadcast confidential communications to arbitrary sets of users, and broadcasters individually send their corresponding ciphertext information for different sets of users. However, in the modern Internet, which is represented by cloud computing and complex networks, with the rapid increase of broadcast users and the rapid growth of the amount of broadcast information, the number of broadcast users is increasing. In order to solve this problem, a broadcast encryption scheme is proposed. In the environment of multi user collection, the new scheme has good communication and computation overhead, and the ciphertext length is only constant. The new scheme is flexible and efficient, and can be widely used in many fields, such as pay TV.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Fiat, A., Naor, M.: Broadcast encryption. In: Proceedings of Advances in Cryptology - CRYPTO 1993, International Cryptology Conference, Santa Barbara, California, USA, 22–26 August 1993, pp. 480–491 (1993)

    Google Scholar 

  2. Zou, X., Xiang, J.: Dynamic broadcast encryption scheme with revoking user. Wuhan Univ. J. Nat. Sci. 18(6), 499–503 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  3. Dodis, Y., Fazio, N.: Public key broadcast encryption for stateless receivers. In: DRM 2002, vol. 2696, pp. 61–80 (2002)

    Google Scholar 

  4. Dodis, Y., Fazio, N.: Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Lecture Notes in Computer Science, vol. 2567, pp. 100–115 (2003)

    Google Scholar 

  5. Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient tree-based revocation in groups of low-state devices. In: Advances in Cryptology - CRYPTO 2004, International Cryptology Conference, pp. 511–527 (2004)

    Google Scholar 

  6. Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In: Advances in Cryptology - CRYPTO 2002, International Cryptology Conference, pp. 47–60 (2002)

    Google Scholar 

  7. Dan, B., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: CRYPTO 2005, vol. 3621, pp. 258–275 (2005)

    Google Scholar 

  8. Delerablée, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Advances in Crypotology, International Conference on Theory and Application of Cryptology and Information Security, pp. 200–215 (2007)

    Google Scholar 

  9. Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with Short Ciphertexts). In: Advances in Cryptology - EUROCRYPT 2009 (2009)

    Google Scholar 

  10. Dan, B., Waters, B., Zhandry, M.: Low overhead broadcast encryption from multilinear maps. In: Advances in Cryptology – CRYPTO 2014. Springer, Heidelberg (2014)

    Google Scholar 

  11. Ren, Y., Wang, S., Zhang, X.: Non-interactive dynamic identity-based broadcast encryption without random oracles. In: Information and Communications Security. Springer, Heidelberg (2012)

    Google Scholar 

  12. Park, S., Lee, K., Dong, H.L.: New constructions of revocable identity-based encryption from multilinear maps. IEEE Trans. Inf. Forensics Secur. 10(8), 1–1(2015)

    Google Scholar 

  13. Boneh, D., Waters, B.: A fully collusion resistant broadcast, trace, and revoke system. In: ACM Conference on Computer and Communications Security, pp. 211–220 (2006)

    Google Scholar 

  14. Gu, C.: An improved multilinear map and its applications. Int. J. Inf. Technol. Web. Eng. 10(3), 64–81 (2015)

    Article  Google Scholar 

  15. Dan, B., Zhandry, M.: Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Algorithmica 8616, 1–53 (2014)

    MathSciNet  MATH  Google Scholar 

  16. Ohtake, G., Hanaoka, G., Ogawa, K.: Efficient broadcast encryption with personalized messages. In: International Conference on Provable Security, pp. 214–228 (2010)

    Google Scholar 

  17. Xu, K., Liao, Y., Qiao, L., Liu, Z., Yang, X.: An identity-based (IDB) broadcast encryption scheme with personalized messages (BEPM). PLoS ONE 10(12), e0143975 (2015)

    Article  Google Scholar 

  18. Wei, Z.: A pairing-based homomorphic encryption scheme for multi-user settings. Int. J. Technol. Hum. Interact. (IJTHI) 12(2), 72–82 (2016)

    Article  Google Scholar 

  19. Chen, Y., Chen, X., Li, H.: More dcca-secure public-key encryptions from kem + dem style hybrid paradigms and some observations on the ‘inner-outer’ structure. Int. J. Grid Util. Comput. 5(1), 60–70 (2014)

    Article  Google Scholar 

  20. Li, S., Zhang, F.: Leakage-resilient identity-based encryption scheme. Int. J. Grid Util. Comput. 4(2/3), 187–196 (2013)

    Article  Google Scholar 

  21. Chen, H., Hu, Y., Lian, Z., Jia, H., Wang, X.A.: An additively homomorphic encryption over large message space. Int. J. Inf. Technol. Web. Eng. 10(3), 82–102 (2015)

    Article  Google Scholar 

  22. Ma, J., Zhang, Y., Wang, Z., Yu, K.: A message topic model for multi-grain SMS spam filtering. Int. J. Technol. Hum. Interact. (IJTHI) 12(2), 83–95 (2016)

    Google Scholar 

Download references

Acknowledgments

This work was supported by National Natural Science Foundation of China (Grant Nos. U1636114,61572521), Natural Science Basic Research Plan in Shaanxi Province of China (Grant Nos. 2016JQ6037).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoyuan Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Lv, L., Yang, X. (2018). A New Broadcast Encryption Scheme for Multi Sets. In: Barolli, L., Zhang, M., Wang, X. (eds) Advances in Internetworking, Data & Web Technologies. EIDWT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 6. Springer, Cham. https://doi.org/10.1007/978-3-319-59463-7_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59463-7_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59462-0

  • Online ISBN: 978-3-319-59463-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics