Anonymous Membership Broadcast Schemes

A membership broadcast scheme is a method by which a dealer broadcasts a secret identity among a set of users, in such a way that only a single user is sure that he is the intended recipient. Anonymous membership broadcast schemes have several applications, such as anonymous delegation, cheating prevention, etc. In a w-anonymous membership broadcast scheme any coalition of at most w users, which does not include the user chosen by the dealer, has no information about the identity of the chosen user. Wang and Pieprzyk proposed a combinatorial approach to 1-anonymous membership broadcast schemes. In particular, they proposed a 1-anonymous membership broadcast scheme offering a logarithmic complexity for both communication and storage. However, their result is non-constructive. In this paper, we consider w-anonymous membership broadcast schemes. First, we propose a formal model to describe such schemes and show lower bounds on the communication and randomness complexities of the schemes. Afterwards, we show that w-anonymous membership broadcast schemes can be constructed starting from (w + 1)-wise independent families of permutations. The communication and storage complexities of our schemes are logarithmic in the number of users.

[1]  C. Jordan Recherches sur les substitutions. , 1872 .

[2]  H. Zassenhaus The theory of groups , 1949 .

[3]  P. Cameron FINITE PERMUTATION GROUPS AND FINITE SIMPLE GROUPS , 1981 .

[4]  D. Robinson A Course in the Theory of Groups , 1982 .

[5]  P. Erdös,et al.  Families of finite sets in which no set is covered by the union ofr others , 1985 .

[6]  Michael Luby,et al.  How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.

[7]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[8]  Arto Salomaa,et al.  Verifying and Recasting Secret Ballots in Computer Networks , 1991, New Results and New Trends in Computer Science.

[9]  Amos Fiat,et al.  Broadcast Encryption , 1993, CRYPTO.

[10]  J. Dixon,et al.  Permutation Groups , 1996 .

[11]  Jan Camenisch,et al.  Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.

[12]  Moni Naor,et al.  On the construction of pseudo-random permutations: Luby-Rackoff revisited (extended abstract) , 1997, STOC '97.

[13]  Paul F. Syverson,et al.  Protocols Using Anonymous Connections: Mobile Applications , 1997, Security Protocols Workshop.

[14]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[15]  Gene Tsudik,et al.  Secret Sets and Applications , 1998, Inf. Process. Lett..

[16]  Alfredo De Santis,et al.  On secret set schemes , 2000, Inf. Process. Lett..

[17]  Private Authentication , 2002, Privacy Enhancing Technologies.

[18]  Huaxiong Wang,et al.  A Combinatorial Approach to Anonymous Membership Broadcast , 2002, COCOON.

[19]  Stelvio Cimato,et al.  Anonymous Group Communication in Mobile Networks , 2003, ICTCS.