Skip to main content
Log in

Improved broadcast encryption schemes with enhanced security

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

A broadcast encryption scheme is one of important primitives to achieve message confidentiality in distributed network, which supports one-to-many encryption under insecure channels. In this paper, we show that any balanced incomplete block design constructed by perpendicular array can be used to realize secure BE schemes. Its broadcast rate, broadcast information rate and the upper bound of the number of collusion resistant are also obtained. According to the characteristics of the block, a more efficient broadcast encryption, using the strong part balanced incomplete block design constructed by rational normal curve is presented. This scheme is secure under an enhanced security model compared with the first construction. Particularly, even any two users are absent in the block, it can achieve fully collusion resistant. Moreover, an improved scheme is given based on the efficiency comparison of these two schemes, in which the broadcast rate is invariant while its broadcast information rate is significantly higher than that of the first construction. Finally, we propose a block reservation scheme, which provides the function of appending users dynamically.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  • Boneh D, Franklin M (1999) An efficient public key traitor tracing scheme. Advances in Cryptology-CRYPTO99. Springer, Berlin Heidelberg, pp 338–353

  • Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in CryptologyCCRYPTO 2005. Springer, Berlin Heidelberg, pp 258–275

  • Colbourn, Charles J (ed) (1996) Handbook of combinatorial designs. CRC Press

  • Dodis Y, Fazio N (2002) Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In: Public Key Cryptography-PKC 2003. Springer, Berlin Heidelberg, pp 100–115

  • Fiat A, Naor M (1994) Broadcast encryption. Advances in Cryptology-CRYPTO93. Springer, Berlin Heidelberg, pp 480–491

  • Fazio N, Perera I M (2012) Outsider-anonymous broadcast encryption with sublinear ciphertexts. In: Public Key CryptographyCPKC 2012. Springer, Berlin Heidelberg, pp 225–242

  • Halevy D, Shamir A (2002) The LSD broadcast encryption scheme. In: Advances in Cryptology-CRYPTO 2002. Springer, Berlin Heidelberg, pp 47–60

  • Li J, Wang Q, Wang C, et al (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp 1–5

  • Li J, Chen X, Li M, et al (2013) Secure deduplication with efficient and reliable convergent key management

  • Libert B, Paterson K G, Quaglia E A (2012) Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In: Public Key Cryptography-CPKC 2012 Springer, Berlin Heidelberg, pp 206–224

  • Naor D, Naor M, Lotspiech J (2001) Revocation and tracing schemes for stateless receivers. In: Advances in Cryptology-CRYPTO 2001. Springer, Berlin Heidelberg, pp 41–62

  • Pei D (2006) Authentication codes and combinatorial designs. CRC Press

  • Pei DY, Dong JW, Rong CM (2010) A novel key pre-distribution scheme for wireless distributed sensor networks. Sci China Inf Sci 53(2):288–298

    Article  MathSciNet  Google Scholar 

  • Quinn KAS (1994) Some constructions for key distribution patterns. Des Codes Cryptogr 4(2):177–191

    Article  MATH  MathSciNet  Google Scholar 

  • Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MATH  MathSciNet  Google Scholar 

  • Stinson D R (1997) On some methods for unconditionally secure key distribution and broadcast encryption. In: Selected Areas in Cryptography. Springer, US, pp 3–31

  • Stinson DR, Van Trung T (1998) Some new results on key distribution patterns and broadcast encryption. Des Codes Cryptogr 14(3):261–279

    Article  MATH  MathSciNet  Google Scholar 

  • Yao D, Fazio N, Dodis Y, Lysyanskaya A (2008) Forward-secure hierarchical IBE with applications to broadcast encryption schemes. In: IOS.Press Cryptology and Information Security Series on Identity-Based Cryptography, vol 7. pp 101–119

  • Zhao X, Zhang F (2011) Traitor tracing against public collaboration. In: Information Security Practice and Experience. Springer, Berlin Heidelberg, pp 302–316

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lishan Ke.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ke, L., Yi, Z. & Ren, Y. Improved broadcast encryption schemes with enhanced security. J Ambient Intell Human Comput 6, 121–129 (2015). https://doi.org/10.1007/s12652-014-0253-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-014-0253-8

Keywords

Navigation