JOURNAL ARTICLE

Outsider-Anonymous Broadcast Encryption with Keyword Search: Generic Construction, CCA Security, and with Sublinear Ciphertexts

Keita EmuraKaisei KajitaGo Ohtake

Year: 2024 Journal:   IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences Vol: E107.A (9)Pages: 1465-1477   Publisher: Institute of Electronics, Information and Communication Engineers

Abstract

As a multi-receiver variant of public key encryption with keyword search (PEKS), broadcast encryption with keyword search (BEKS) has been proposed (Attrapadung et al. at ASIACRYPT 2006/Chatterjee-Mukherjee at INDOCRYPT 2018). Unlike broadcast encryption, no receiver anonymity is considered because the test algorithm takes a set of receivers as input and thus a set of receivers needs to be contained in a ciphertext. In this paper, we propose a generic construction of BEKS from anonymous andweakly robust 3-level hierarchical identity-based encryption (HIBE). The proposed generic construction provides outsider anonymity, where an adversary is allowed to obtain secret keys of outsiders who do not belong to the challenge sets, and provides sublinear-size ciphertext in terms of the number of receivers. Moreover, the proposed construction considers security against chosen-ciphertext attack (CCA) where an adversary is allowed to access a test oracle in the searchable encryption context. The proposed generic construction can be seen as an extension to the Fazio-Perera generic construction of anonymous broadcast encryption (PKC 2012) from anonymous and weakly robust identity-based encryption (IBE) and the Boneh et al. generic construction of PEKS (EUROCRYPT 2004) from anonymous IBE.We run the Fazio-Perera construction employs on the first-level identity and run the Boneh et al. generic construction on the second-level identity, i.e., a keyword is regarded as a second-level identity. The third-level identity is used for providing CCA security by employing one-time signatures. We also introduce weak robustness in the HIBE setting, and demonstrate that the Abdalla et al. generic transformation (TCC 2010/JoC 2018) for providing weak robustness to IBE works for HIBE with an appropriate parameter setting. We also explicitly introduce attractive concrete instantiations of the proposed generic construction from pairings and lattices, respectively.

Keywords:
Broadcast encryption Encryption Ciphertext Computer science Anonymity Probabilistic encryption Computer security Theoretical computer science Public-key cryptography Identity (music)

Metrics

1
Cited By
0.00
FWCI (Field Weighted Citation Impact)
55
Refs
0.02
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Complexity and Algorithms in Graphs
Physical Sciences →  Computer Science →  Computational Theory and Mathematics
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

BOOK-CHAPTER

Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts

Nelly FazioIrippuge Milinda Perera

Lecture notes in computer science Year: 2012 Pages: 225-242
BOOK-CHAPTER

Threshold Broadcast Encryption with Keyword Search

Shiwei ZhangYi MuGuomin Yang

Lecture notes in computer science Year: 2016 Pages: 322-337
© 2026 ScienceGate Book Chapters — All rights reserved.