Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption
Broadcast encryption (<inline-formula> <math display="inline"> <semantics> <mi mathvariant="sans-serif">BE</mi> </semantics> </math> </inline-formula>) allows a sender to encrypt a message to an arbitrary target set of legitimate us...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-06-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/12/6/969 |
_version_ | 1797565950538547200 |
---|---|
author | Qutaibah Malluhi Vinh Duc Tran Viet Cuong Trinh |
author_facet | Qutaibah Malluhi Vinh Duc Tran Viet Cuong Trinh |
author_sort | Qutaibah Malluhi |
collection | DOAJ |
description | Broadcast encryption (<inline-formula> <math display="inline"> <semantics> <mi mathvariant="sans-serif">BE</mi> </semantics> </math> </inline-formula>) allows a sender to encrypt a message to an arbitrary target set of legitimate users and to prevent non-legitimate users from recovering the broadcast information. <inline-formula> <math display="inline"> <semantics> <mi mathvariant="sans-serif">BE</mi> </semantics> </math> </inline-formula> has numerous practical applications such as satellite geolocation systems, file sharing systems, pay-TV systems, e-Health, social networks, cloud storage systems, etc. This paper presents two new decentralized BE schemes. Decentralization means that there is no single authority responsible for generating secret cryptographic keys for system users. Therefore, the scheme eliminates the concern of having a single point of failure as the central authority could be attacked, become malicious, or become unavailable. Recent attacks have shown that the centralized approach could lead to system malfunctioning or to leaking sensitive information. Another achievement of the proposed BE schemes is their performance characteristics that make them suitable for environments with light-weight clients, such as in Internet-of-Things (IoT) applications. The proposed approach improves the performance over existing decentralized BE schemes by simultaneously achieving constant size ciphertext, constant size secret key and fast decryption. |
first_indexed | 2024-03-10T19:20:05Z |
format | Article |
id | doaj.art-a2faa4a32f764052ae56fecf45689de8 |
institution | Directory Open Access Journal |
issn | 2073-8994 |
language | English |
last_indexed | 2024-03-10T19:20:05Z |
publishDate | 2020-06-01 |
publisher | MDPI AG |
record_format | Article |
series | Symmetry |
spelling | doaj.art-a2faa4a32f764052ae56fecf45689de82023-11-20T03:02:57ZengMDPI AGSymmetry2073-89942020-06-0112696910.3390/sym12060969Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast DecryptionQutaibah Malluhi0Vinh Duc Tran1Viet Cuong Trinh2College of Engineering, Qatar University, Doha 00000, QatarSchool of Information and Communication Technology, Hanoi University of Science and Technology, Ha Noi 10000, VietnamFaculty of Information and Communication Technology, Hong Duc University, 565 Quang Trung, Thanh Hoa 40000, VietnamBroadcast encryption (<inline-formula> <math display="inline"> <semantics> <mi mathvariant="sans-serif">BE</mi> </semantics> </math> </inline-formula>) allows a sender to encrypt a message to an arbitrary target set of legitimate users and to prevent non-legitimate users from recovering the broadcast information. <inline-formula> <math display="inline"> <semantics> <mi mathvariant="sans-serif">BE</mi> </semantics> </math> </inline-formula> has numerous practical applications such as satellite geolocation systems, file sharing systems, pay-TV systems, e-Health, social networks, cloud storage systems, etc. This paper presents two new decentralized BE schemes. Decentralization means that there is no single authority responsible for generating secret cryptographic keys for system users. Therefore, the scheme eliminates the concern of having a single point of failure as the central authority could be attacked, become malicious, or become unavailable. Recent attacks have shown that the centralized approach could lead to system malfunctioning or to leaking sensitive information. Another achievement of the proposed BE schemes is their performance characteristics that make them suitable for environments with light-weight clients, such as in Internet-of-Things (IoT) applications. The proposed approach improves the performance over existing decentralized BE schemes by simultaneously achieving constant size ciphertext, constant size secret key and fast decryption.https://www.mdpi.com/2073-8994/12/6/969broadcast encryptiondecentralizedmulti-authorityconstant size ciphertextfast decryption |
spellingShingle | Qutaibah Malluhi Vinh Duc Tran Viet Cuong Trinh Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption Symmetry broadcast encryption decentralized multi-authority constant size ciphertext fast decryption |
title | Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption |
title_full | Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption |
title_fullStr | Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption |
title_full_unstemmed | Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption |
title_short | Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption |
title_sort | decentralized broadcast encryption schemes with constant size ciphertext and fast decryption |
topic | broadcast encryption decentralized multi-authority constant size ciphertext fast decryption |
url | https://www.mdpi.com/2073-8994/12/6/969 |
work_keys_str_mv | AT qutaibahmalluhi decentralizedbroadcastencryptionschemeswithconstantsizeciphertextandfastdecryption AT vinhductran decentralizedbroadcastencryptionschemeswithconstantsizeciphertextandfastdecryption AT vietcuongtrinh decentralizedbroadcastencryptionschemeswithconstantsizeciphertextandfastdecryption |