Team for Research in
Ubiquitous Secure Technology

• Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
D. Boneh, C. Gentry, B. Waters

Citation
D. Boneh, C. Gentry, B. Waters. "• Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys". Crypto, 258-275, 2005.

Abstract
We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. In our first construction both ciphertexts and private keys are of constant size (only two group elements), no matter what the subset of receivers is. The public key size in this system is linear in the total number of receivers. Our second system is a generalization of the first that provides a tradeoff between ciphertext size and public key size. For example, we achieve a collusion resistant broadcast system for n users where both ciphertexts and public keys are of size O(sqrt(n)) (for any subset of receivers). We discuss several applications of these systems.

Electronic downloads

Citation formats  
  • HTML
    D. Boneh, C. Gentry, B. Waters. <a
    href="http://www.truststc.org/pubs/605.html"
    >•	Collusion Resistant Broadcast Encryption
    With Short Ciphertexts and Private Keys</a>, Crypto,
    258-275, 2005.
  • Plain text
    D. Boneh, C. Gentry, B. Waters.
    "•	Collusion Resistant Broadcast
    Encryption With Short Ciphertexts and Private Keys".
    Crypto, 258-275, 2005.
  • BibTeX
    @inproceedings{BonehGentryWaters05_CollusionResistantBroadcastEncryptionWithShortCiphertexts,
        author = {D. Boneh and C. Gentry and B. Waters},
        title = {•	Collusion Resistant Broadcast Encryption With
                  Short Ciphertexts and Private Keys},
        booktitle = {Crypto},
        pages = {258-275},
        year = {2005},
        abstract = {We describe two new public key broadcast
                  encryption systems for stateless receivers. Both
                  systems are fully secure against any number of
                  colluders. In our first construction both
                  ciphertexts and private keys are of constant size
                  (only two group elements), no matter what the
                  subset of receivers is. The public key size in
                  this system is linear in the total number of
                  receivers. Our second system is a generalization
                  of the first that provides a tradeoff between
                  ciphertext size and public key size. For example,
                  we achieve a collusion resistant broadcast system
                  for n users where both ciphertexts and public keys
                  are of size O(sqrt(n)) (for any subset of
                  receivers). We discuss several applications of
                  these systems. },
        URL = {http://www.truststc.org/pubs/605.html}
    }
    

Posted by Jessica Gamble on 16 Mar 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.