SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT ENCRYPTION
AND SHORT CIPHERTEXTS
ABSTRACT:
Traditional broadcast encryption (BE) schemes allow a sender to securely broadcast to
any subset of members but require a trusted party to distribute decryption keys. Group key
agreement (GKA) protocols enable a group of members to negotiate a common encryption key
via open networks so that only the group members can decrypt the ciphertexts encrypted under
the shared encryption key, but a sender cannot exclude any particular member from decrypting
the ciphertexts. In this paper, we bridge these two notions with a hybrid primitive referred to as
contributory broadcast encryption (ConBE). In this new primitive, a group of members negotiate
a common public encryption key while each member holds a decryption key. A sender seeing the
public group encryption key can limit the decryption to a subset of members of his choice.
Following this model, we propose a ConBE scheme with short ciphertexts. The scheme is proven
to be fully collusion-resistant under the decision n-Bilinear Diffie-Hellman Exponentiation
(BDHE) assumption in the standard model. Of independent interest, we present a new BE
scheme that is aggregatable. The aggregatability property is shown to be useful to construct
advanced protocols.
EXISTING SYSTEM:
 Group key agreement (GKA) is another well-understood cryptographic primitive to
secure group-oriented communications. A conventional GKA allows a group of members
to establish a common secret key via open networks. However, whenever a sender wants
to send a message to a group, he must first join the group and run a GKA protocol to
share a secret key with the intended members.
 More recently, and to overcome this limitation, Wu et al. introduced asymmetric GKA, in
which only a common group public key is negotiated and each group member holds a
different decryption key.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 However, neither conventional symmetric GKA nor the newly introduced asymmetric
GKA allow the sender to unilaterally exclude any particular member from reading the
plaintext. Hence, it is essential to find more flexible cryptographic primitives allowing
dynamic broadcasts without a fully trusted dealer.
DISADVANTAGES OF EXISTING SYSTEM:
 Need a fully trusted third party to set up the system.
 Existing GKA protocols cannot handle sender/member changes efficiently.
PROPOSED SYSTEM:
 We present the Contributory Broadcast Encryption (ConBE) primitive, which is a hybrid
of GKA and BE.
 This full paper provides complete security proofs, illustrates the necessity of the
aggregatability of the underlying BE building block and shows the practicality of our
ConBE scheme with experiments.
 First, we model the ConBE primitive and formalize its security definitions. ConBE
incorporates the underlying ideas of GKA and BE. A group of members interact via open
networks to negotiate a public encryption key while each member holds a different secret
decryption key. Using the public encryption key, anyone can encrypt any message to any
subset of the group members and only the intended receivers can decrypt.
 We formalize collusion resistance by defining an attacker who can fully control all the
members outside the intended receivers but cannot extract useful information from the
ciphertext.
 Second, we present the notion of aggregatable broadcast encryption (AggBE). Coarsely
speaking, a BE scheme is aggregatable if its secure instances can be aggregated into a
new secure instance of the BE scheme. Specifically, only the aggregated decryption keys
of the same user are valid decryption keys corresponding to the aggregated public keys of
the underlying BE instances.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 Finally, we construct an efficient ConBE scheme with our AggBE scheme as a building
block. The ConBE construction is proven to be semi-adaptively secure under the decision
BDHE assumption in the standard model.
ADVANTAGES OF PROPOSED SYSTEM:
 We construct a concrete AggBE scheme tightly proven to be fully collusion-resistant
under the decision BDHE assumption.
 The proposed AggBE scheme offers efficient encryption/decryption and short
ciphertexts.
 Only one round is required to establish the public group encryption key and set up the
ConBE system.
SYSTEM ARCHITECTURE:
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SYSTEM REQUIREMENTS
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : JAVA
 IDE : Netbeans 7.4
 Database : MYSQL
REFERENCE:
 Qianhong Wu, Member, IEEE, Bo Qin, Lei Zhang, Member, IEEE, Josep Domingo-
Ferrer, Fellow, IEEE Oriol Farr`as, and Jes´us A. Manj´on, “Contributory Broadcast
Encryption with Efficient Encryption and Short Ciphertexts”, IEEE TRANSACTIONS
ON COMPUTERS 2015.

More Related Content

PDF
Group key agreement with local connectivity
PDF
Donn felker etehreum
PPTX
Smart contract
PPTX
Abhishek jaiswal blockchain
DOCX
Control cloud data access privilege and anonymity with fully
PDF
Smart contract
PDF
Ethereum Solidity Fundamentals
PPTX
Can smart Contracts Exist without The Blockchain
Group key agreement with local connectivity
Donn felker etehreum
Smart contract
Abhishek jaiswal blockchain
Control cloud data access privilege and anonymity with fully
Smart contract
Ethereum Solidity Fundamentals
Can smart Contracts Exist without The Blockchain

What's hot (8)

PDF
Programming smart contracts in solidity
PDF
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
PDF
DaoLiName-Decentralized Identity as Public Key
PPTX
Creating Smart Contract
PDF
Sarwar sayeed , hector marco gisbert, tom caira ieee
PDF
Blockchain
PDF
Applying Blockchain to Transactive Energy
PDF
Blockchain Technology
Programming smart contracts in solidity
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
DaoLiName-Decentralized Identity as Public Key
Creating Smart Contract
Sarwar sayeed , hector marco gisbert, tom caira ieee
Blockchain
Applying Blockchain to Transactive Energy
Blockchain Technology
Ad

Viewers also liked (16)

PDF
An exploration of geographic authentication schemes
PDF
Traffic load adaptive medium access control for fully connected mobile ad hoc...
PDF
Contributory broadcast encryption with efficient encryption and short ciphert...
PDF
Distributed and adaptive medium access control for internet of-things-enabled...
PDF
Inference attack on browsing history of twitter users using public click anal...
PDF
Domain sensitive recommendation with user-item subgroup analysis
PDF
Nearest keyword set search in multi dimensional datasets
PDF
Clustering data streams based on shared density between micro clusters
PDF
Using hash tag graph based topic model to connect semantically-related words ...
PDF
Probabilistic static load balancing of parallel mining of frequent sequences
PDF
Efficient algorithms for mining top k high utility item sets
PDF
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
PDF
Location aware keyword query suggestion based on document proximity
PDF
Madam effective and efficient behavior based android malware detection and pr...
PDF
Fine grained two-factor access control for web-based cloud computing services
PDF
A comprehensive study on willingness maximization for social activity plannin...
An exploration of geographic authentication schemes
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Contributory broadcast encryption with efficient encryption and short ciphert...
Distributed and adaptive medium access control for internet of-things-enabled...
Inference attack on browsing history of twitter users using public click anal...
Domain sensitive recommendation with user-item subgroup analysis
Nearest keyword set search in multi dimensional datasets
Clustering data streams based on shared density between micro clusters
Using hash tag graph based topic model to connect semantically-related words ...
Probabilistic static load balancing of parallel mining of frequent sequences
Efficient algorithms for mining top k high utility item sets
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
Location aware keyword query suggestion based on document proximity
Madam effective and efficient behavior based android malware detection and pr...
Fine grained two-factor access control for web-based cloud computing services
A comprehensive study on willingness maximization for social activity plannin...
Ad

Similar to Contributory broadcast encryption with efficient encryption and short ciphertexts (20)

PDF
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
DOCX
Identity based encryption with outsourced revocation in cloud computing
DOCX
Identity based encryption with outsourced revocation in cloud computing
PDF
Key aggregate cryptosystem for scalable data sharing in cloud storage
DOCX
Audit free cloud storage via deniable attribute-based encryption
DOCX
Audit free cloud storage via deniable attribute-based encryption
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
DOCX
Audit free cloud storage via deniable attribute-based encryption
DOCX
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
PDF
Decentralized access control with anonymous authentication of data stored in ...
PDF
An efficient distributed group key management using hierarchical approach wit...
PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
Dual server public-key encryption with keyword search for secure cloud storage
DOCX
A secure group key management scheme for sensor networks
PDF
Flexible and fine grained attribute-based data storage in cloud computing
PDF
Flexible and fine grained attribute-based data storage in cloud computing
PDF
Design of Secure Hash Algorithm(SHA)
DOCX
Efficient rekeying framework for secure multicast with diverse subscription-p...
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Key aggregate cryptosystem for scalable data sharing in cloud storage
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Audit free cloud storage via deniable attribute-based encryption
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Decentralized access control with anonymous authentication of data stored in ...
An efficient distributed group key management using hierarchical approach wit...
International Journal of Engineering and Science Invention (IJESI)
Dual server public-key encryption with keyword search for secure cloud storage
A secure group key management scheme for sensor networks
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
Design of Secure Hash Algorithm(SHA)
Efficient rekeying framework for secure multicast with diverse subscription-p...
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Cell Types and Its function , kingdom of life
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Final Presentation General Medicine 03-08-2024.pptx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Microbial disease of the cardiovascular and lymphatic systems
2.FourierTransform-ShortQuestionswithAnswers.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
01-Introduction-to-Information-Management.pdf
Cell Structure & Organelles in detailed.
Renaissance Architecture: A Journey from Faith to Humanism
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Cell Types and Its function , kingdom of life
TR - Agricultural Crops Production NC III.pdf
Institutional Correction lecture only . . .
Module 4: Burden of Disease Tutorial Slides S2 2025

Contributory broadcast encryption with efficient encryption and short ciphertexts

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT ENCRYPTION AND SHORT CIPHERTEXTS ABSTRACT: Traditional broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so that only the group members can decrypt the ciphertexts encrypted under the shared encryption key, but a sender cannot exclude any particular member from decrypting the ciphertexts. In this paper, we bridge these two notions with a hybrid primitive referred to as contributory broadcast encryption (ConBE). In this new primitive, a group of members negotiate a common public encryption key while each member holds a decryption key. A sender seeing the public group encryption key can limit the decryption to a subset of members of his choice. Following this model, we propose a ConBE scheme with short ciphertexts. The scheme is proven to be fully collusion-resistant under the decision n-Bilinear Diffie-Hellman Exponentiation (BDHE) assumption in the standard model. Of independent interest, we present a new BE scheme that is aggregatable. The aggregatability property is shown to be useful to construct advanced protocols. EXISTING SYSTEM:  Group key agreement (GKA) is another well-understood cryptographic primitive to secure group-oriented communications. A conventional GKA allows a group of members to establish a common secret key via open networks. However, whenever a sender wants to send a message to a group, he must first join the group and run a GKA protocol to share a secret key with the intended members.  More recently, and to overcome this limitation, Wu et al. introduced asymmetric GKA, in which only a common group public key is negotiated and each group member holds a different decryption key.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  However, neither conventional symmetric GKA nor the newly introduced asymmetric GKA allow the sender to unilaterally exclude any particular member from reading the plaintext. Hence, it is essential to find more flexible cryptographic primitives allowing dynamic broadcasts without a fully trusted dealer. DISADVANTAGES OF EXISTING SYSTEM:  Need a fully trusted third party to set up the system.  Existing GKA protocols cannot handle sender/member changes efficiently. PROPOSED SYSTEM:  We present the Contributory Broadcast Encryption (ConBE) primitive, which is a hybrid of GKA and BE.  This full paper provides complete security proofs, illustrates the necessity of the aggregatability of the underlying BE building block and shows the practicality of our ConBE scheme with experiments.  First, we model the ConBE primitive and formalize its security definitions. ConBE incorporates the underlying ideas of GKA and BE. A group of members interact via open networks to negotiate a public encryption key while each member holds a different secret decryption key. Using the public encryption key, anyone can encrypt any message to any subset of the group members and only the intended receivers can decrypt.  We formalize collusion resistance by defining an attacker who can fully control all the members outside the intended receivers but cannot extract useful information from the ciphertext.  Second, we present the notion of aggregatable broadcast encryption (AggBE). Coarsely speaking, a BE scheme is aggregatable if its secure instances can be aggregated into a new secure instance of the BE scheme. Specifically, only the aggregated decryption keys of the same user are valid decryption keys corresponding to the aggregated public keys of the underlying BE instances.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  Finally, we construct an efficient ConBE scheme with our AggBE scheme as a building block. The ConBE construction is proven to be semi-adaptively secure under the decision BDHE assumption in the standard model. ADVANTAGES OF PROPOSED SYSTEM:  We construct a concrete AggBE scheme tightly proven to be fully collusion-resistant under the decision BDHE assumption.  The proposed AggBE scheme offers efficient encryption/decryption and short ciphertexts.  Only one round is required to establish the public group encryption key and set up the ConBE system. SYSTEM ARCHITECTURE:
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SYSTEM REQUIREMENTS HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA  IDE : Netbeans 7.4  Database : MYSQL REFERENCE:  Qianhong Wu, Member, IEEE, Bo Qin, Lei Zhang, Member, IEEE, Josep Domingo- Ferrer, Fellow, IEEE Oriol Farr`as, and Jes´us A. Manj´on, “Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts”, IEEE TRANSACTIONS ON COMPUTERS 2015.