TY - JOUR
T1 - Analysis and improvement of a secret broadcast with binding encryption in broadcasting networks
AU - Zhang, Mingwu
AU - Li, Fagen
AU - Takagi, Tsuyoshi
N1 - Copyright:
Copyright 2017 Elsevier B.V., All rights reserved.
PY - 2012/2
Y1 - 2012/2
N2 - A secret broadcasting scheme deals with secure transmission of a message so that more than one privileged receiver can decrypt it. Jeong et al. proposed an efficient secret broadcast scheme using binding encryption to obtain the security properties of ind-cpa semantic security and decryption consistency. Thereafter, Wu et al. showed that the Jeong et al.'s scheme just achieves consistency in relatively weak condition and is also inefficient, and they constructed a more efficient scheme to improve the security. In this letter, we demonstrate that theWu et al.'s scheme is also a weak decryption consistency and cannot achieve the decryption consistency if an adversary has the ability to tamper with the ciphertext. We also present an improved and more efficient secret broadcast scheme to remedy the weakness. The proposed scheme achieves decryption consistency and ind-cca security, which can protect against stronger adversary's attacks and allows us to broadcast a digital message securely.
AB - A secret broadcasting scheme deals with secure transmission of a message so that more than one privileged receiver can decrypt it. Jeong et al. proposed an efficient secret broadcast scheme using binding encryption to obtain the security properties of ind-cpa semantic security and decryption consistency. Thereafter, Wu et al. showed that the Jeong et al.'s scheme just achieves consistency in relatively weak condition and is also inefficient, and they constructed a more efficient scheme to improve the security. In this letter, we demonstrate that theWu et al.'s scheme is also a weak decryption consistency and cannot achieve the decryption consistency if an adversary has the ability to tamper with the ciphertext. We also present an improved and more efficient secret broadcast scheme to remedy the weakness. The proposed scheme achieves decryption consistency and ind-cca security, which can protect against stronger adversary's attacks and allows us to broadcast a digital message securely.
UR - http://www.scopus.com/inward/record.url?scp=84863054290&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84863054290&partnerID=8YFLogxK
U2 - 10.1587/transinf.E95.D.686
DO - 10.1587/transinf.E95.D.686
M3 - Article
AN - SCOPUS:84863054290
SN - 0916-8532
VL - E95-D
SP - 686
EP - 689
JO - IEICE Transactions on Information and Systems
JF - IEICE Transactions on Information and Systems
IS - 2
ER -