ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2018, Vol. 55 ›› Issue (7): 1409-1420.doi: 10.7544/issn1000-1239.2018.20180085

Special Issue: 2018物联网安全专题

Previous Articles     Next Articles

An Attribute-Based Broadcast Encryption Scheme Suitable for the Broadcasting Network

Li Xuejun1, Yuan Yawen1, Jin Chunhua2   

  1. 1(School of Cyber Engineering, Xidian University, Xi’an 710071); 2(The Laboratory for Internet of Things and Mobile Internet Technology of Jiangsu Province (Huaiyin University of Technology), Huaian Jiangsu 223001)
  • Online:2018-07-01

Abstract: In the transitional period, broadcasting network will cooperate with ‘cloud channel device’ to implement a unified layout and a service cloud platform. However, the opening cloud made the information security protection be hard in the broadcasting network. Attribute-based broadcast encryption technology combines the advantages of broadcast encryption and the attribute-based encryption technologies. It can securely transmit messages to multiple users and achieve flexible ciphertext access control. It is applicable to the broadcasting network which has multi-user and multi-service. However, most of the attribute-based broadcast encryption schemes up to now are not efficient enough and have many shortcomings, such as the long length of ciphertext, the big number of user private keys, the complicated calculation of encryption and decryption, and without weighted-attributes considering. In order to overcome the flaws of the attribute-based broadcast encryption schemes, the contribution of this paper is an efficient attribute-based broadcast encryption scheme for broadcasting network environment. This scheme is based on a classical broadcast encryption scheme, and the sender can choose the receiver set freely, achieving efficient user revocation. Adopt a dynamic weighted threshold access structure and introduce a wildcard mechanism which fixes the length of the broadcast ciphertext and enhance the flexibility of the ciphertext access control. The weighted attributes make the scheme more in line with the actual application environment. We incorporate a mediated attribute-based encryption to achieve outsourced storage and outsourced decryption. By this technology, we can effectively reduce the storage of private keys and computational overhead. Finally, through the security analysis and experimental simulation, we prove our scheme achieves choose plaintext attack (CPA) security safety, and has high efficiency.

Key words: broadcasting network, attribute-based broadcast encryption, weighted-attributes, fixed-length ciphertext, low computational overhead, low outsourced decryption, choose plaintext attack (CPA) security

CLC Number: