Abstract
A broadcast encryption scheme is one of important primitives to achieve message confidentiality in distributed network, which supports one-to-many encryption under insecure channels. In this paper, we show that any balanced incomplete block design constructed by perpendicular array can be used to realize secure BE schemes. Its broadcast rate, broadcast information rate and the upper bound of the number of collusion resistant are also obtained. According to the characteristics of the block, a more efficient broadcast encryption, using the strong part balanced incomplete block design constructed by rational normal curve is presented. This scheme is secure under an enhanced security model compared with the first construction. Particularly, even any two users are absent in the block, it can achieve fully collusion resistant. Moreover, an improved scheme is given based on the efficiency comparison of these two schemes, in which the broadcast rate is invariant while its broadcast information rate is significantly higher than that of the first construction. Finally, we propose a block reservation scheme, which provides the function of appending users dynamically.
Similar content being viewed by others
References
Boneh D, Franklin M (1999) An efficient public key traitor tracing scheme. Advances in Cryptology-CRYPTO99. Springer, Berlin Heidelberg, pp 338–353
Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in CryptologyCCRYPTO 2005. Springer, Berlin Heidelberg, pp 258–275
Colbourn, Charles J (ed) (1996) Handbook of combinatorial designs. CRC Press
Dodis Y, Fazio N (2002) Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In: Public Key Cryptography-PKC 2003. Springer, Berlin Heidelberg, pp 100–115
Fiat A, Naor M (1994) Broadcast encryption. Advances in Cryptology-CRYPTO93. Springer, Berlin Heidelberg, pp 480–491
Fazio N, Perera I M (2012) Outsider-anonymous broadcast encryption with sublinear ciphertexts. In: Public Key CryptographyCPKC 2012. Springer, Berlin Heidelberg, pp 225–242
Halevy D, Shamir A (2002) The LSD broadcast encryption scheme. In: Advances in Cryptology-CRYPTO 2002. Springer, Berlin Heidelberg, pp 47–60
Li J, Wang Q, Wang C, et al (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp 1–5
Li J, Chen X, Li M, et al (2013) Secure deduplication with efficient and reliable convergent key management
Libert B, Paterson K G, Quaglia E A (2012) Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In: Public Key Cryptography-CPKC 2012 Springer, Berlin Heidelberg, pp 206–224
Naor D, Naor M, Lotspiech J (2001) Revocation and tracing schemes for stateless receivers. In: Advances in Cryptology-CRYPTO 2001. Springer, Berlin Heidelberg, pp 41–62
Pei D (2006) Authentication codes and combinatorial designs. CRC Press
Pei DY, Dong JW, Rong CM (2010) A novel key pre-distribution scheme for wireless distributed sensor networks. Sci China Inf Sci 53(2):288–298
Quinn KAS (1994) Some constructions for key distribution patterns. Des Codes Cryptogr 4(2):177–191
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Stinson D R (1997) On some methods for unconditionally secure key distribution and broadcast encryption. In: Selected Areas in Cryptography. Springer, US, pp 3–31
Stinson DR, Van Trung T (1998) Some new results on key distribution patterns and broadcast encryption. Des Codes Cryptogr 14(3):261–279
Yao D, Fazio N, Dodis Y, Lysyanskaya A (2008) Forward-secure hierarchical IBE with applications to broadcast encryption schemes. In: IOS.Press Cryptology and Information Security Series on Identity-Based Cryptography, vol 7. pp 101–119
Zhao X, Zhang F (2011) Traitor tracing against public collaboration. In: Information Security Practice and Experience. Springer, Berlin Heidelberg, pp 302–316
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ke, L., Yi, Z. & Ren, Y. Improved broadcast encryption schemes with enhanced security. J Ambient Intell Human Comput 6, 121–129 (2015). https://doi.org/10.1007/s12652-014-0253-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-014-0253-8