Abstract Sharing economic data is paramount for improving quality and developing more efficient ways to produce statistics, and making better economic decisions. The economic data is of great importance to the corporations and governments, and they must be protected against the outsiders. Unfortunately, in an economic administration system, a few users may be malicious, or they are at high risk to leak information to the outsiders. Therefore, the economic data must also be protected against these users. The traditional broadcast encryption can provide protected data sharing among honest users. However, it is not efficient when most of the users are honest, and only a small amount of users are malicious. The traditional method is not cost effective, and does not fit to the situation where the set of malicious users dynamically changes either. Meanwhile, in traditional broadcast encryption, the authorized users’ identities need to be sent with the ciphertext. The valid users’ anonymity is not provided. To solve these problems, in this work, we present a novel cryptographic primitive, i.e. ID-based Dynamic Exclusive Broadcast Encryption (IBDEBE), and based on a hybrid framework (the combination of the exponent-inversion framework and the commutative-blinding framework) we propose an IBDEBE scheme with constant-size private keys and ciphertexts. The IBDEBE scheme is proved to be semi-adaptively semantically secure in the random oracle model. By applying the IBDEBE scheme, a secure economic data sharing protocol is devised, which is efficient and flexible in dynamic honest user groups, and it provides good security properties, i.e. source authenticity, data integrity protection, data access control, resistance to collusion attack and anonymity. We evaluate the performance of our solution with experiments and the results show good computation efficiency.
[1]
Jennifer Seberry,et al.
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext
,
2015,
IEEE Transactions on Information Forensics and Security.
[2]
Fuchun Guo,et al.
Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization
,
2017,
Comput. J..
[3]
Tanja Lange,et al.
Pairing-Based Cryptography
,
2005,
Handbook of Elliptic and Hyperelliptic Curve Cryptography.
[4]
Bernardo A. Huberman,et al.
Securing private data sharing in multi-party analytics
,
2016,
First Monday.
[5]
D. Boneh,et al.
Short Signatures from the Weil Pairing
,
2001,
Journal of Cryptology.
[6]
Yun Ling,et al.
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage
,
2018,
IEEE Transactions on Information Forensics and Security.