Advanced Search
    Li Xuejun, Yuan Yawen, Jin Chunhua. An Attribute-Based Broadcast Encryption Scheme Suitable for the Broadcasting Network[J]. Journal of Computer Research and Development, 2018, 55(7): 1409-1420. DOI: 10.7544/issn1000-1239.2018.20180085
    Citation: Li Xuejun, Yuan Yawen, Jin Chunhua. An Attribute-Based Broadcast Encryption Scheme Suitable for the Broadcasting Network[J]. Journal of Computer Research and Development, 2018, 55(7): 1409-1420. DOI: 10.7544/issn1000-1239.2018.20180085

    An Attribute-Based Broadcast Encryption Scheme Suitable for the Broadcasting Network

    • In the transitional period, broadcasting network will cooperate with ‘cloud channel device’ to implement a unified layout and a service cloud platform. However, the opening cloud made the information security protection be hard in the broadcasting network. Attribute-based broadcast encryption technology combines the advantages of broadcast encryption and the attribute-based encryption technologies. It can securely transmit messages to multiple users and achieve flexible ciphertext access control. It is applicable to the broadcasting network which has multi-user and multi-service. However, most of the attribute-based broadcast encryption schemes up to now are not efficient enough and have many shortcomings, such as the long length of ciphertext, the big number of user private keys, the complicated calculation of encryption and decryption, and without weighted-attributes considering. In order to overcome the flaws of the attribute-based broadcast encryption schemes, the contribution of this paper is an efficient attribute-based broadcast encryption scheme for broadcasting network environment. This scheme is based on a classical broadcast encryption scheme, and the sender can choose the receiver set freely, achieving efficient user revocation. Adopt a dynamic weighted threshold access structure and introduce a wildcard mechanism which fixes the length of the broadcast ciphertext and enhance the flexibility of the ciphertext access control. The weighted attributes make the scheme more in line with the actual application environment. We incorporate a mediated attribute-based encryption to achieve outsourced storage and outsourced decryption. By this technology, we can effectively reduce the storage of private keys and computational overhead. Finally, through the security analysis and experimental simulation, we prove our scheme achieves choose plaintext attack (CPA) security safety, and has high efficiency.
    • loading

    Catalog

      Turn off MathJax
      Article Contents

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return