Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption

Broadcast encryption (<inline-formula> <math display="inline"> <semantics> <mi mathvariant="sans-serif">BE</mi> </semantics> </math> </inline-formula>) allows a sender to encrypt a message to an arbitrary target set of legitimate us...

Full description

Bibliographic Details
Main Authors: Qutaibah Malluhi, Vinh Duc Tran, Viet Cuong Trinh
Format: Article
Language:English
Published: MDPI AG 2020-06-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/12/6/969
_version_ 1797565950538547200
author Qutaibah Malluhi
Vinh Duc Tran
Viet Cuong Trinh
author_facet Qutaibah Malluhi
Vinh Duc Tran
Viet Cuong Trinh
author_sort Qutaibah Malluhi
collection DOAJ
description Broadcast encryption (<inline-formula> <math display="inline"> <semantics> <mi mathvariant="sans-serif">BE</mi> </semantics> </math> </inline-formula>) allows a sender to encrypt a message to an arbitrary target set of legitimate users and to prevent non-legitimate users from recovering the broadcast information. <inline-formula> <math display="inline"> <semantics> <mi mathvariant="sans-serif">BE</mi> </semantics> </math> </inline-formula> has numerous practical applications such as satellite geolocation systems, file sharing systems, pay-TV systems, e-Health, social networks, cloud storage systems, etc. This paper presents two new decentralized BE schemes. Decentralization means that there is no single authority responsible for generating secret cryptographic keys for system users. Therefore, the scheme eliminates the concern of having a single point of failure as the central authority could be attacked, become malicious, or become unavailable. Recent attacks have shown that the centralized approach could lead to system malfunctioning or to leaking sensitive information. Another achievement of the proposed BE schemes is their performance characteristics that make them suitable for environments with light-weight clients, such as in Internet-of-Things (IoT) applications. The proposed approach improves the performance over existing decentralized BE schemes by simultaneously achieving constant size ciphertext, constant size secret key and fast decryption.
first_indexed 2024-03-10T19:20:05Z
format Article
id doaj.art-a2faa4a32f764052ae56fecf45689de8
institution Directory Open Access Journal
issn 2073-8994
language English
last_indexed 2024-03-10T19:20:05Z
publishDate 2020-06-01
publisher MDPI AG
record_format Article
series Symmetry
spelling doaj.art-a2faa4a32f764052ae56fecf45689de82023-11-20T03:02:57ZengMDPI AGSymmetry2073-89942020-06-0112696910.3390/sym12060969Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast DecryptionQutaibah Malluhi0Vinh Duc Tran1Viet Cuong Trinh2College of Engineering, Qatar University, Doha 00000, QatarSchool of Information and Communication Technology, Hanoi University of Science and Technology, Ha Noi 10000, VietnamFaculty of Information and Communication Technology, Hong Duc University, 565 Quang Trung, Thanh Hoa 40000, VietnamBroadcast encryption (<inline-formula> <math display="inline"> <semantics> <mi mathvariant="sans-serif">BE</mi> </semantics> </math> </inline-formula>) allows a sender to encrypt a message to an arbitrary target set of legitimate users and to prevent non-legitimate users from recovering the broadcast information. <inline-formula> <math display="inline"> <semantics> <mi mathvariant="sans-serif">BE</mi> </semantics> </math> </inline-formula> has numerous practical applications such as satellite geolocation systems, file sharing systems, pay-TV systems, e-Health, social networks, cloud storage systems, etc. This paper presents two new decentralized BE schemes. Decentralization means that there is no single authority responsible for generating secret cryptographic keys for system users. Therefore, the scheme eliminates the concern of having a single point of failure as the central authority could be attacked, become malicious, or become unavailable. Recent attacks have shown that the centralized approach could lead to system malfunctioning or to leaking sensitive information. Another achievement of the proposed BE schemes is their performance characteristics that make them suitable for environments with light-weight clients, such as in Internet-of-Things (IoT) applications. The proposed approach improves the performance over existing decentralized BE schemes by simultaneously achieving constant size ciphertext, constant size secret key and fast decryption.https://www.mdpi.com/2073-8994/12/6/969broadcast encryptiondecentralizedmulti-authorityconstant size ciphertextfast decryption
spellingShingle Qutaibah Malluhi
Vinh Duc Tran
Viet Cuong Trinh
Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption
Symmetry
broadcast encryption
decentralized
multi-authority
constant size ciphertext
fast decryption
title Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption
title_full Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption
title_fullStr Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption
title_full_unstemmed Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption
title_short Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption
title_sort decentralized broadcast encryption schemes with constant size ciphertext and fast decryption
topic broadcast encryption
decentralized
multi-authority
constant size ciphertext
fast decryption
url https://www.mdpi.com/2073-8994/12/6/969
work_keys_str_mv AT qutaibahmalluhi decentralizedbroadcastencryptionschemeswithconstantsizeciphertextandfastdecryption
AT vinhductran decentralizedbroadcastencryptionschemeswithconstantsizeciphertextandfastdecryption
AT vietcuongtrinh decentralizedbroadcastencryptionschemeswithconstantsizeciphertextandfastdecryption