Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption

In this paper we firstly introduce the notion of multi- receiver certificate-based encryption that avoids the inherent key escrow problem while preserving the implicit certification of multi-receiver identity-based encryption. We also construct a highly efficient multi-receiver certificate-based encryption scheme which eliminates pairing computation to encrypt a message for multiple receivers. Moreover, the proposed scheme only needs one pairing computation for decrypting the ciphertext. We compare our scheme with the most efficient multi-receiver identity-based encryption scheme[2] in terms of the computational point of view, and show that our scheme provides better efficiency than [2]. Finally, we discuss how to properly transform our scheme into a new public key broadcast encryption scheme based on subset-cover framework, which enjoys the advantages of certificate-based encryption.

[1]  Tatsuaki Okamoto,et al.  Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, CRYPTO.

[2]  Martin Sweeting,et al.  Embedded Intelligent Imaging On-Board Small Satellites , 2005, Asia-Pacific Computer Systems Architecture Conference.

[3]  Kenneth G. Paterson,et al.  CBE from CL-PKE: A Generic Construction and Efficient Schemes , 2005, Public Key Cryptography.

[4]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[5]  Craig Gentry,et al.  Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.

[6]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[7]  Joonsang Baek,et al.  Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.

[8]  Dan Boneh,et al.  Short Signatures Without Random Oracles , 2004, EUROCRYPT.

[9]  Amos Fiat,et al.  Broadcast Encryption , 1993, CRYPTO.

[10]  Yevgeniy Dodis,et al.  Public Key Broadcast Encryption for Stateless Receivers , 2002, Digital Rights Management Workshop.

[11]  Liqun Chen,et al.  Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme , 2005, IMACC.

[12]  Ping Chen,et al.  Tsunami damage assessment using high resolution satellite imagery: a case study of Aceh, Indonesia , 2005, Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium, 2005. IGARSS '05..

[13]  Mihir Bellare,et al.  Randomness Re-use in Multi-recipient Encryption Schemeas , 2003, Public Key Cryptography.

[14]  Moni Naor,et al.  Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.

[15]  Kaoru Kurosawa,et al.  Multi-recipient Public-Key Encryption with Shortened Ciphertext , 2002, Public Key Cryptography.

[16]  Martin Unwin,et al.  Detection and Processing of bistatically reflected GPS signals from low Earth orbit for the purpose of ocean remote sensing , 2005, IEEE Transactions on Geoscience and Remote Sensing.

[17]  Rob Sherwood,et al.  Using Autonomy Flight Software to Improve Science Return on Earth Observing One , 2005, J. Aerosp. Comput. Inf. Commun..

[18]  S. Hensley,et al.  On-board processor for direct distribution of change detection data products [radar imaging] , 2004, Proceedings of the 2004 IEEE Radar Conference (IEEE Cat. No.04CH37509).

[19]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[20]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..