Adaptively secure certificate-based broadcast encryption and its application to cloud storage service

Abstract The existing public key broadcast encryption schemes are mainly constructed in identity-based cryptosystem, which bears the inherent problems of key escrow and key distribution. The certificate-based encryption mechanism can effectively address the problems in identity-based cryptosystem. Meanwhile, it simplifies the certificate revocation issue for traditional public key cryptosystem. Inspired by the idea of certificate-based encryption, we put forward the new primitive certificate-based broadcast encryption as well as its formal definition and security model. In virtue of prime order bilinear groups, we present an instantiation scheme of certificate-based broadcast encryption. To our best knowledge, the proposed scheme is the first adaptively secure scheme for certificate-based broadcast encryption in the standard model against chosen-ciphertext attack. Compared with the previous work, our scheme has advantages in the respects of computation cost as well as security properties. Furthermore, we present an application scenario of the proposed scheme for data access control in cloud storage service.

[1]  Jiguo Li,et al.  Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage , 2019, IEEE Transactions on Cloud Computing.

[2]  Qing Wu,et al.  Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups , 2012, Math. Comput. Model..

[3]  Ping Wang,et al.  Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound , 2018, IEEE Transactions on Dependable and Secure Computing.

[4]  Jiguo Li,et al.  Anonymous Certificate-Based Broadcast Encryption With Personalized Messages , 2020, IEEE Transactions on Broadcasting.

[5]  Xiaolei Dong,et al.  Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[6]  Jiguo Li,et al.  Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext , 2019, Soft Computing.

[7]  Jiguo Li,et al.  Hierarchical attribute based encryption with continuous leakage-resilience , 2019, Inf. Sci..

[8]  Palash Sarkar,et al.  Efficient Adaptively Secure IBBE From the SXDH Assumption , 2016, IEEE Transactions on Information Theory.

[9]  Jiguo Li,et al.  Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.

[10]  Geong Sen Poh,et al.  Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT , 2022, IEEE Transactions on Cloud Computing.

[11]  Jiguo Li,et al.  Remote Data Checking With a Designated Verifier in Cloud Storage , 2020, IEEE Systems Journal.

[12]  Qiaoyan Wen,et al.  Adaptively Secure Broadcast Encryption With Constant Ciphertexts , 2016, IEEE Transactions on Broadcasting.

[13]  Jian Shen,et al.  Key-policy attribute-based encryption against continual auxiliary input leakage , 2019, Inf. Sci..

[14]  Jennifer Seberry,et al.  Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext , 2015, IEEE Transactions on Information Forensics and Security.

[15]  Joonsang Baek,et al.  Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.

[16]  Xiaolei Dong,et al.  White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively , 2018, IEEE Transactions on Dependable and Secure Computing.

[17]  Yang Yang Broadcast encryption based non-interactive key distribution in MANETs , 2014, J. Comput. Syst. Sci..

[18]  Yanli Ren,et al.  Fully CCA2 secure identity based broadcast encryption without random oracles , 2009, Inf. Process. Lett..

[19]  Ping Wang,et al.  On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices , 2018, IEEE Systems Journal.

[20]  Hao Yan,et al.  A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[21]  David Pointcheval,et al.  Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys , 2007, Pairing.

[22]  Jiguo Li,et al.  Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage , 2018, IEEE Transactions on Services Computing.

[23]  Yun Ling,et al.  Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage , 2018, IEEE Transactions on Information Forensics and Security.

[24]  Jiguo Li,et al.  Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service , 2019, KSII Trans. Internet Inf. Syst..

[25]  Yang Lu,et al.  Anonymous certificate-based broadcast encryption with constant decryption cost , 2018, Inf. Sci..

[26]  Yang Lu,et al.  A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds , 2016, Future Gener. Comput. Syst..

[27]  David Pointcheval,et al.  Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts , 2012, International Journal of Information Security.

[28]  Cécile Delerablée,et al.  Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.

[29]  Jeffrey Xu Yu,et al.  DeepDirect: Learning Directions of Social Ties with Edge-Based Network Embedding (Extended Abstract) , 2019, 2019 IEEE 35th International Conference on Data Engineering (ICDE).

[30]  Brent Waters,et al.  Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.

[31]  Jiguo Li,et al.  Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage , 2020, IEEE Systems Journal.

[32]  Ping Wang,et al.  Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity , 2015, Inf. Sci..

[33]  Yao Wang,et al.  Full Verifiability for Outsourced Decryption in Attribute Based Encryption , 2020, IEEE Transactions on Services Computing.

[34]  Chul Sur,et al.  Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption , 2007 .

[35]  Jiguo Li,et al.  Identity-based broadcast encryption with continuous leakage resilience , 2018, Inf. Sci..

[36]  Jiguo Li,et al.  Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing , 2019, IEEE Transactions on Emerging Topics in Computing.

[37]  Yi Mu,et al.  Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption , 2015, IEEE Transactions on Information Forensics and Security.

[38]  Yi Mu,et al.  Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption , 2004, ASIAN.

[39]  Fangguo Zhang,et al.  Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority , 2012, J. Syst. Softw..

[40]  Xu An Wang,et al.  Cryptanalysis of an identity based broadcast encryption scheme without random oracles , 2011, Inf. Process. Lett..

[41]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..