Abstract
Broadcasters use broadcast encryption to broadcast confidential communications to arbitrary sets of users, and broadcasters individually send their corresponding ciphertext information for different sets of users. However, in the modern Internet, which is represented by cloud computing and complex networks, with the rapid increase of broadcast users and the rapid growth of the amount of broadcast information, the number of broadcast users is increasing. In order to solve this problem, a broadcast encryption scheme is proposed. In the environment of multi user collection, the new scheme has good communication and computation overhead, and the ciphertext length is only constant. The new scheme is flexible and efficient, and can be widely used in many fields, such as pay TV.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Fiat, A., Naor, M.: Broadcast encryption. In: Proceedings of Advances in Cryptology - CRYPTO 1993, International Cryptology Conference, Santa Barbara, California, USA, 22–26 August 1993, pp. 480–491 (1993)
Zou, X., Xiang, J.: Dynamic broadcast encryption scheme with revoking user. Wuhan Univ. J. Nat. Sci. 18(6), 499–503 (2013)
Dodis, Y., Fazio, N.: Public key broadcast encryption for stateless receivers. In: DRM 2002, vol. 2696, pp. 61–80 (2002)
Dodis, Y., Fazio, N.: Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Lecture Notes in Computer Science, vol. 2567, pp. 100–115 (2003)
Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient tree-based revocation in groups of low-state devices. In: Advances in Cryptology - CRYPTO 2004, International Cryptology Conference, pp. 511–527 (2004)
Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In: Advances in Cryptology - CRYPTO 2002, International Cryptology Conference, pp. 47–60 (2002)
Dan, B., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: CRYPTO 2005, vol. 3621, pp. 258–275 (2005)
Delerablée, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Advances in Crypotology, International Conference on Theory and Application of Cryptology and Information Security, pp. 200–215 (2007)
Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with Short Ciphertexts). In: Advances in Cryptology - EUROCRYPT 2009 (2009)
Dan, B., Waters, B., Zhandry, M.: Low overhead broadcast encryption from multilinear maps. In: Advances in Cryptology – CRYPTO 2014. Springer, Heidelberg (2014)
Ren, Y., Wang, S., Zhang, X.: Non-interactive dynamic identity-based broadcast encryption without random oracles. In: Information and Communications Security. Springer, Heidelberg (2012)
Park, S., Lee, K., Dong, H.L.: New constructions of revocable identity-based encryption from multilinear maps. IEEE Trans. Inf. Forensics Secur. 10(8), 1–1(2015)
Boneh, D., Waters, B.: A fully collusion resistant broadcast, trace, and revoke system. In: ACM Conference on Computer and Communications Security, pp. 211–220 (2006)
Gu, C.: An improved multilinear map and its applications. Int. J. Inf. Technol. Web. Eng. 10(3), 64–81 (2015)
Dan, B., Zhandry, M.: Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Algorithmica 8616, 1–53 (2014)
Ohtake, G., Hanaoka, G., Ogawa, K.: Efficient broadcast encryption with personalized messages. In: International Conference on Provable Security, pp. 214–228 (2010)
Xu, K., Liao, Y., Qiao, L., Liu, Z., Yang, X.: An identity-based (IDB) broadcast encryption scheme with personalized messages (BEPM). PLoS ONE 10(12), e0143975 (2015)
Wei, Z.: A pairing-based homomorphic encryption scheme for multi-user settings. Int. J. Technol. Hum. Interact. (IJTHI) 12(2), 72–82 (2016)
Chen, Y., Chen, X., Li, H.: More dcca-secure public-key encryptions from kem + dem style hybrid paradigms and some observations on the ‘inner-outer’ structure. Int. J. Grid Util. Comput. 5(1), 60–70 (2014)
Li, S., Zhang, F.: Leakage-resilient identity-based encryption scheme. Int. J. Grid Util. Comput. 4(2/3), 187–196 (2013)
Chen, H., Hu, Y., Lian, Z., Jia, H., Wang, X.A.: An additively homomorphic encryption over large message space. Int. J. Inf. Technol. Web. Eng. 10(3), 82–102 (2015)
Ma, J., Zhang, Y., Wang, Z., Yu, K.: A message topic model for multi-grain SMS spam filtering. Int. J. Technol. Hum. Interact. (IJTHI) 12(2), 83–95 (2016)
Acknowledgments
This work was supported by National Natural Science Foundation of China (Grant Nos. U1636114,61572521), Natural Science Basic Research Plan in Shaanxi Province of China (Grant Nos. 2016JQ6037).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Lv, L., Yang, X. (2018). A New Broadcast Encryption Scheme for Multi Sets. In: Barolli, L., Zhang, M., Wang, X. (eds) Advances in Internetworking, Data & Web Technologies. EIDWT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 6. Springer, Cham. https://doi.org/10.1007/978-3-319-59463-7_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-59463-7_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59462-0
Online ISBN: 978-3-319-59463-7
eBook Packages: EngineeringEngineering (R0)