Skip to main content
Erschienen in: Annals of Telecommunications 1-2/2023

20.09.2022

Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles

verfasst von: Amit Kumar Singh, Kamalesh Acharya, Ratna Dutta

Erschienen in: Annals of Telecommunications | Ausgabe 1-2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has gained widespread popularity in the industry and academia and rapidly becomes an integral part of our everyday life. It offers several benefits including reduced cost on technical support for data backups, saving electric power and maintenance cost. These encourage the major industry players like Google, IBM, Microsoft to invest into cloud storage with the goal to extend the spectrum of cloud-based services from open public to closed private. One of the crucial challenges in cloud computing is the security of outsourced data. Sharing sensitive data among multiple users under the same domain in a secure and efficient way requires technical solutions. Identity-based broadcast encryption (IBBE) is an important building block in cryptography. This is a one to many encryption that broadcasts a message to many identities. In this paper, we address the key escrow problem of IBBE. As private key generator (PKG) generates secret keys for users, it has the capability to decrypt the ciphertext and recover the message. The accountable authority IBBE was introduced to give accountability in IBBE, where white-box A-IBBE can differentiate the creator of a given pirated private key between the PKG and suspected user and black-box A-IBBE can further trace the creator of a decoder box. In our construction, we have established the secret key by using zero-knowledge proof between the user and PKG. The decryption key is held by the user only. This restricts PKG to re-distribute keys maliciously and solves the key escrow problem. Inspired by the work of Zhao et al., we develop an accountable authority identity-based broadcast encryption scheme (A-IBBE). Our construction is the first publicly traceable weak black-box A-IBBE scheme secure against the indistinguishability under chosen-identity and chosen-plaintext attack in the standard model. We support the conjectured security of our candidate by analysis and prove its security without using any random oracle under the hardness of the decision bilinear Diffie-Hellman exponent (DB-DHE) sum problem. Another interesting feature of our scheme is that it features a constant size secret key and ciphertext. More positively, when contrasted with the existing similar schemes, our scheme exhibits favorable results in terms of secret key size and ciphertext length with constant number of pairing computations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We assume that id \(\in \mathbb {Z}_{q}\) and our construction can be extended to arbitrary identities in {0, 1} by taking a collision-resistant hash function \(H:\{0,1\}^{*} \rightarrow \mathbb {Z}_{q}\) [6].
 
2
The paring \(e(g_{1}^{\gamma },\widehat {g}_{1})\) and \(e(\widehat {g}_{2},g_{1}^{\gamma })\) can be precomputed to reduce the computation cost of Uid and in the setup phase put these into the master public key.
 
Literatur
1.
Zurück zum Zitat Acharya K (2020) Secure and efficient public key multi-channel broadcast encryption schemes. J Inform Secur Appl 51:102436 Acharya K (2020) Secure and efficient public key multi-channel broadcast encryption schemes. J Inform Secur Appl 51:102436
2.
Zurück zum Zitat Acharya K, Dutta R (2021) Constructing provable secure broadcast encryption scheme with dealership. J Inform Secur Appl 58:102736 Acharya K, Dutta R (2021) Constructing provable secure broadcast encryption scheme with dealership. J Inform Secur Appl 58:102736
3.
Zurück zum Zitat Agrawal S, Yamada S (2020) Optimal broadcast encryption from pairings and lwe. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 13–43 Agrawal S, Yamada S (2020) Optimal broadcast encryption from pairings and lwe. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 13–43
4.
Zurück zum Zitat Bellare M, Goldreich O (1992) On defining proofs of knowledge. In: Annual international cryptology conference. Springer, pp 390–420 Bellare M, Goldreich O (1992) On defining proofs of knowledge. In: Annual international cryptology conference. Springer, pp 390–420
5.
Zurück zum Zitat Bellare M, Goldreich O (2011) On probabilistic versus deterministic provers in the definition of proofs of knowledge. In: Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. Springer, pp 114–123 Bellare M, Goldreich O (2011) On probabilistic versus deterministic provers in the definition of proofs of knowledge. In: Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. Springer, pp 114–123
6.
Zurück zum Zitat Boneh D, Boyen X (2011) Efficient selective identity-based encryption without random oracles. J Cryptol 24(4):659–693CrossRefMATH Boneh D, Boyen X (2011) Efficient selective identity-based encryption without random oracles. J Cryptol 24(4):659–693CrossRefMATH
7.
Zurück zum Zitat Boneh D, Boyen X, Goh E. -J. (2005) Hierarchical identity based encryption with constant size ciphertext. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 440–456 Boneh D, Boyen X, Goh E. -J. (2005) Hierarchical identity based encryption with constant size ciphertext. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 440–456
8.
Zurück zum Zitat Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Annual international cryptology conference. Springer, pp 258–275 Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Annual international cryptology conference. Springer, pp 258–275
9.
Zurück zum Zitat Camenisch J (1998) Group signature schemes and payment systems based on the discrete logarithm problem. PhD thesis, ETH Zurich Camenisch J (1998) Group signature schemes and payment systems based on the discrete logarithm problem. PhD thesis, ETH Zurich
10.
Zurück zum Zitat Chen L, Li J, Lu Y, Zhang Y (2020) Adaptively secure certificate-based broadcast encryption and its application to cloud storage service. Inf Sci 538:273–289CrossRefMATH Chen L, Li J, Lu Y, Zhang Y (2020) Adaptively secure certificate-based broadcast encryption and its application to cloud storage service. Inf Sci 538:273–289CrossRefMATH
11.
Zurück zum Zitat Gentry C, Halevi S (2009) Hierarchical identity based encryption with polynomially many levels. In: Theory of cryptography conference. Springer, pp 437–456 Gentry C, Halevi S (2009) Hierarchical identity based encryption with polynomially many levels. In: Theory of cryptography conference. Springer, pp 437–456
12.
Zurück zum Zitat Gentry C, Waters B (2009) Adaptive security in broadcast encryption systems (with short ciphertexts). In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 171–188 Gentry C, Waters B (2009) Adaptive security in broadcast encryption systems (with short ciphertexts). In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 171–188
13.
Zurück zum Zitat Goyal V (2007) Reducing trust in the pkg in identity based cryptosystems. In: Annual international cryptology conference. Springer, pp 430–447 Goyal V (2007) Reducing trust in the pkg in identity based cryptosystems. In: Annual international cryptology conference. Springer, pp 430–447
14.
Zurück zum Zitat Goyal V, Lu S, Sahai A, Waters B (2008) Black-box accountable authority identity-based encryption. In: Proceedings of the 15th ACM conference on Computer and communications security, pp 427–436 Goyal V, Lu S, Sahai A, Waters B (2008) Black-box accountable authority identity-based encryption. In: Proceedings of the 15th ACM conference on Computer and communications security, pp 427–436
15.
Zurück zum Zitat Guo S, Zhang C (2008) Identity-based broadcast encryption scheme with untrusted pkg. In: 2008 The 9th international conference for young computer scientists. IEEE, pp 1613–1618 Guo S, Zhang C (2008) Identity-based broadcast encryption scheme with untrusted pkg. In: 2008 The 9th international conference for young computer scientists. IEEE, pp 1613–1618
16.
Zurück zum Zitat Jao D, Yoshida K (2009) Boneh-boyen signatures and the strong diffie-hellman problem. In: International conference on pairing-based cryptography. Springer, pp 1–16 Jao D, Yoshida K (2009) Boneh-boyen signatures and the strong diffie-hellman problem. In: International conference on pairing-based cryptography. Springer, pp 1–16
17.
Zurück zum Zitat Kim J, Susilo W, Au MH, Seberry J (2013) Efficient semi-static secure broadcast encryption scheme. In: International conference on pairing-based cryptography. Springer, pp 62–76 Kim J, Susilo W, Au MH, Seberry J (2013) Efficient semi-static secure broadcast encryption scheme. In: International conference on pairing-based cryptography. Springer, pp 62–76
18.
Zurück zum Zitat Lai J, Deng RH, Zhao Y, Weng J (2013) Accountable authority identity-based encryption with public traceability. In: Cryptographers’ track at the RSA conference. Springer, pp 326–342 Lai J, Deng RH, Zhao Y, Weng J (2013) Accountable authority identity-based encryption with public traceability. In: Cryptographers’ track at the RSA conference. Springer, pp 326–342
19.
Zurück zum Zitat Lai J, Mu Y, Guo F, Chen R (2017) Fully privacy-preserving id-based broadcast encryption with authorization. Comput J 60(12):1809–1821CrossRef Lai J, Mu Y, Guo F, Chen R (2017) Fully privacy-preserving id-based broadcast encryption with authorization. Comput J 60(12):1809–1821CrossRef
20.
Zurück zum Zitat Lai J, Mu Y, Guo F, Jiang P, Ma S (2018) Identity-based broadcast encryption for inner products. Comput J 61(8):1240–1251CrossRef Lai J, Mu Y, Guo F, Jiang P, Ma S (2018) Identity-based broadcast encryption for inner products. Comput J 61(8):1240–1251CrossRef
21.
Zurück zum Zitat Libert B, Vergnaud D (2009) Towards black-box accountable authority ibe with short ciphertexts and private keys. In: International workshop on public key cryptography. Springer, pp 235–255 Libert B, Vergnaud D (2009) Towards black-box accountable authority ibe with short ciphertexts and private keys. In: International workshop on public key cryptography. Springer, pp 235–255
22.
Zurück zum Zitat Libert B, Vergnaud D (2011) Towards practical black-box accountable authority ibe: Weak black-box traceability with short ciphertexts and private keys. IEEE Trans Inform Theory 57(10):7189–7204CrossRefMATH Libert B, Vergnaud D (2011) Towards practical black-box accountable authority ibe: Weak black-box traceability with short ciphertexts and private keys. IEEE Trans Inform Theory 57(10):7189–7204CrossRefMATH
23.
Zurück zum Zitat Qiao H, Ba H, Zhou H, Wang Z, Ren J, Hu Y (2018) Practical, provably secure, and black-box traceable cp-abe for cryptographic cloud storage. Symmetry 10(10):482CrossRef Qiao H, Ba H, Zhou H, Wang Z, Ren J, Hu Y (2018) Practical, provably secure, and black-box traceable cp-abe for cryptographic cloud storage. Symmetry 10(10):482CrossRef
24.
Zurück zum Zitat Sahai A, Seyalioglu H (2011) Fully secure accountable-authority identity-based encryption. In: International workshop on public key cryptography. Springer, pp 296–316 Sahai A, Seyalioglu H (2011) Fully secure accountable-authority identity-based encryption. In: International workshop on public key cryptography. Springer, pp 296–316
25.
Zurück zum Zitat Zhao X, Zhang F (2012) Fully cca2 secure identity-based broadcast encryption with black-box accountable authority. J Syst Softw 85(3):708–716CrossRef Zhao X, Zhang F (2012) Fully cca2 secure identity-based broadcast encryption with black-box accountable authority. J Syst Softw 85(3):708–716CrossRef
26.
Zurück zum Zitat Zhao Z, Guo F, Lai J, Susilo W, Wang B, Hu Y (2020) Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts. Theor Comput Sci 809:73–87CrossRefMATH Zhao Z, Guo F, Lai J, Susilo W, Wang B, Hu Y (2020) Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts. Theor Comput Sci 809:73–87CrossRefMATH
Metadaten
Titel
Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles
verfasst von
Amit Kumar Singh
Kamalesh Acharya
Ratna Dutta
Publikationsdatum
20.09.2022
Verlag
Springer International Publishing
Erschienen in
Annals of Telecommunications / Ausgabe 1-2/2023
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-022-00925-8

Weitere Artikel der Ausgabe 1-2/2023

Annals of Telecommunications 1-2/2023 Zur Ausgabe

Neuer Inhalt