3 research outputs found

    A Versatile Cryptographic Primitive to Protect Group Communications and Computation Platforms

    Get PDF
    We introduce the Contributory Broadcast Encryption (ConBE) primitive, which is a half and half of GKA and BE. Contrasted with its preparatory Asiacrypt, this gives complete security proofs, outlines the need of the aggregatability of the fundamental BE building block and demonstrates the common sense of our ConBE plot with tests. In particular, our primary commitments are as per the following. Initially, we display the ConBE primitive and formalize its security definitions. ConBE joins the hidden thoughts of GKA and BE. A gathering of individuals interface by means of open systems to arrange an open encryption key while every part holds an alternate mystery decoding key. Utilizing general society encryption key, anybody can encode any message to any subset of the gathering individuals and just the proposed collectors can decode. Dissimilar to GKA, ConBE enables the sender to bar a few individuals from perusing the ciphertexts. Contrasted with BE, ConBE does not require a completely put stock in outsider to set up the framework. We formalize conspiracy resistance by characterizing an assailant who can completely control every one of the individuals outside the planned collectors yet can't extricate helpful data from the ciphertext

    The Revocation Mechanism Of A Be Scheme Into Asymmetric GKA

    Get PDF
    We connect these two thoughts with a half breed primitive alluded to as contributory broadcast encryption (ConBE). In this new primitive, a gathering of individuals arrange a typical open encryption key while every part holds a decoding key. A sender seeing people in general gathering encryption key can restrain the decoding to a subset of individuals from his decision. Taking after this model, we propose a ConBE plot with short ciphertexts. The plan is turned out to be completely plot safe under the choice n-Bilinear Diffie-Hellman Exponentiation (BDHE) suspicion in the standard model. Of free intrigue, we introduce another BE plan that is aggregatable. The aggregatability property is appeared to be helpful to build propelled conventions

    Identity-based fault tolerant conference key agreement

    No full text
    Lots of conference key agreement protocols have been suggested to secure computer network conference. Most of them operate only when all conferees are honest, but do not work when some conferees are malicious and attempt to delay or destruct the conference. Recently, Tzeng proposed a conference key agreement protocol with fault tolerance in terms that a common secret conference key among honest conferees can be established even if malicious conferees exist. In the case where a conferee can broadcast different messages in different subnetworks, Tzeng’s protocol is vulnerable to a “different key attack” from malicious conferees. In addition, Tzeng’s protocol requires each conferee to broadcast to the rest of the group and receive n 1 messages in a single round (where n stands for the number of conferees). Moreover, it has to handle n simultaneous broadcasts in one round. In this paper, we propose a novel fault-tolerant conference key agreement protocol, in which each conferee only needs to send one message to a “semitrusted” conference bridge and receive one broadcast message. Our protocol is an identity-based key agreement, built on elliptic curve cryptography. It is resistant to the different key attack from malicious conferees and needs less communication cost than Tzeng’s protocol
    corecore