How to construct interval encryption from binary tree encryption

Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

In a broadcast encryption system with a total of n users, each user is assigned with a unique index i ∈ [1, n]. An encryptor can choose a receiver set S ⊆ [1, n] freely and encrypt a message for the recipients in S such that only those receivers can open the message. The transmission overload of most previous broadcast encryption systems grows in line with the number of revoked users r and thus they are suitable for the scenario where the target receiver set is large when r ≪ n holds. Some other recently proposed constructions for arbitrary receiver set require a unreasonably large user storage and long decryption time. On the other hand, it is observed that, in a practical broadcast encryption system, the receiver set can be regarded as a collection of κ natural intervals, where the interval number κ should be much less than r for most cases. This observation motivates us to introduce a novel type of encryption, called interval encryption, which could realize a more efficient broadcast encryption. To achieve this, we first present a generic way to transform a binary tree encryption scheme into interval encryption. One concrete instantiation of this method based on the hierarchical identity based encryption scheme by Boneh et al. only requires a O(κ) transmission cost and O(log n) private storage consumption, while the decryption is dominated by O(log n) group operations. With detailed performance analysis, we demonstrate that the proposed interval encryption strategy has the superiority on improved efficiency and thus is expected to serve as a more efficient solution in more cases than the traditional systems in practice. Interestingly, our methodology can also be employed to transform a fully secure hierarchical identity based encryption scheme proposed by Lewko and Waters into an adaptively secure interval encryption scheme with a O(κ) transmission cost and O(log n) private storage consumption. Finally, we also discuss several other promising applications of interval encryption.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 8th International Conference, ACNS 2010, Proceedings
Pages19-34
Number of pages16
DOIs
StatePublished - 2010
Externally publishedYes
Event8th International Conference on Applied Cryptography and Network Security, ACNS 2010 - Beijing, China
Duration: 22 Jun 201025 Jun 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6123 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Conference on Applied Cryptography and Network Security, ACNS 2010
Country/TerritoryChina
CityBeijing
Period22/06/1025/06/10

Keywords

  • Binary tree encryption
  • Hierarchical IBE
  • Interval encryption
  • Public key broadcast encryption

Fingerprint

Dive into the research topics of 'How to construct interval encryption from binary tree encryption'. Together they form a unique fingerprint.

Cite this