DOI QR코드

DOI QR Code

Efficient Multi-Receiver Certificate-Based Encryption Scheme and Its Application

효율적인 인증서기반 다중수신자 암호 기법 및 응용

  • 서철 (부경대학교 전자계산학과) ;
  • 정채덕 (부경대학교 정보보호학협동과정) ;
  • 이경현 (부경대학교 전자컴퓨터정보통신공학과)
  • Published : 2007.12.31

Abstract

In this paper, we introduce the notion of certificate-based encryption in multi-receiver environment, which avoids the inherent key escrow problem while preserving the implicit certification in identity-based encryption. We also construct a highly efficient certificate-based encryption scheme for multi-receiver environment, which eliminates pairing computation to encrypt a message for multiple receivers. Moreover, the proposed scheme only needs one pairing computation for decrypting the ciphertext. We compare our scheme with the most efficient identity-based encryption scheme for multi-receiver environment proposed by Baek et.al.[1] in terms of the computational point of view, and show that our scheme provides better efficiency than Baek's scheme. Finally, we discuss how to properly transform our scheme into a new public key broadcast encryption scheme based on subset-cover framework.

본 논문에서는 다중수신자 환경에서 신원기반 암호 기법의 키 위탁 문제를 해결함과 동시에 묵시적인 공개키 인증을 유지하기 위하여 인증서기반 (certificate-based) 다중수신자 암호 기법을 소개한다. 제안 기법은 다중수신자에 대하여 메시지를 암호화하는 단계에서 Pairing 연산을 제거하였을 뿐만 아니라 복호화 단계에서 단 한번의 Pairing 연산만을 요구한다. 또한, Baek등에 의해 제안되었던 다중수신자 환경에서 가장 효율적인 신원기반 암호 기법[1]과의 계산량 비교를 통하여 제안 기법이 보다 효율적임을 보인다. 마지막으로 제안 기법을 이용하여 Subset-Cover 프레임워크 기반의 새로운 스테이트리스 공개키 브로드캐 스트 암호 기법을 제시한다.

Keywords

References

  1. J. Baek, R. Safavi-Naini, and W. Susilo,'Efficient multi-receiver identity-based encryption and its application to broadcast encryption,' Public Key Cryptography - PKC 2005, LNCS 3386, pp. 380-397, 2005
  2. A. Fiat and M. Naor, 'Broadcast Encryption,' Advances in Cryptology - Crypto 1994, LNCS 773, pp. 480-491, 1994
  3. Y. Dodis and N.Fazio, 'Public Key Broadcast Encryption for Stateless Receivers,' ACM-DRM, 2002
  4. O. Baudron, D. Pointcheval, and J. Stem, 'Exteded Notions of Security for Multicast Public Key Cryptosystems,' ICALP 2000, LNCS 1853, pp. 499-511, 2000
  5. M. Bellare, A. Boldyreva, and S. Micali, 'Public-key encryption in a multi-user setting: Security proofs and improvements,' Advances in Cryptology - Eurocrypt 2000, LNCS 1807, pp. 259-274, 2000
  6. T. EIGamal, 'A public key cryptosystem and a signature scheme based on discrete logarithms,' IEEE Transactions on Information Theory, Vol.31, pp. 469-472, 1985 https://doi.org/10.1109/TIT.1985.1057074
  7. K. Kurosawa, 'Multi-Recipient Public-Key Encryption with Shortened Ciphertext,' Public Key Cryptography - PKC 2002, LNCS 2274, pp. 48-63, 2002
  8. M. Bellare, A. Boldyreva, and D. Pointcheval, 'Multi-recepient encryption schemes: Security notions and randomness re-use,' Public Key Cryptography PKC 2003, LNCS 2567, pp. 85-99, 2003
  9. D. Boneh and M. Franklin, 'Identity-based encryption from the weil pairing,' Advances in Cryptology Crypto 2001, LNCS 2139, pp. 213-229, 2001
  10. L. Chen, K. Harrison, D. Soldera, and N. P. Smart, 'Applications Multiple Trust Authorities in Pairing Based Cryptosystems,' InfraSec 2002, LNCS 2437, pp. 260-275, 2002
  11. N. P. Smart, 'Access Control Using Pairing Based Cryptography,' CT-RSA 2003, LNCS 2612, pp. 111-121, 2003
  12. C. Gentry, 'Certificate-Based Encryption and the Certificate Revocation Problem,' Advances in Cryptology - Eurocrypt 2003, LNCS 2656, pp. 272-293, 2003
  13. MlRACL, Multiprecision Integer and Rational Arithmetic C/C++ Library, http://indigo.ie/mscott
  14. D. Naor, M. Naor, and J. Lotspiech, 'Revocation and Tracing Schemes for Stateless Receivers,' Advances in Cryptology - Crypto 2001, LNCS 2139, pp.41-62, 2001
  15. S. S. Al-Riyami and K. G. Paterson. 'Certificateless Public Key Cryptography,' Advances in Cryptology-Asiacrypt 2003, LNCS 2894, pp. 452-473, 2003
  16. M. Bellare and P. Rogaway, 'Random oracles are practical: A paradigm for designing efficient protocols,' ACM CCS'93, pp. 62-73, 1993
  17. D. Boneh and X. Boyen, 'Efficient selective-id secure identity based encryption without random oracles,' Advances in Cryptology - Eurocrypt 2004, LNCS 3027, pp.223-238, 2004
  18. D. Boneh and X. Boyen, 'Short signatures without random oracles,' Advances in Cryptology - Eurocrypt 2004, LNCS 3027, pp. 56-73, 2004
  19. L. Chen and Z. Chen, 'Security proof of Sakai-Kashahara's identity-based encryption scheme,' Cryptography ePrint Archive, Report 2005/226, 2005
  20. E. Fujisaki and T. Okamoto, 'Secure integration of asymmetric and symmetric encryption schemes,' Advances in Cryptology - Crypto'99, LNCS 1666, pp.535-554, 1999