CINXE.COM

Broadcast Encryption using Sum-Product decomposition of Boolean functions

<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <link href="/css/bootstrap/css/bootstrap.min.css" rel="stylesheet"> <script src="/css/bootstrap/js/bootstrap.bundle.min.js"></script> <title>Broadcast Encryption using Sum-Product decomposition of Boolean functions</title> <link rel="stylesheet" href="/css/iacrcc.css"> <link rel="icon" type="image/png" href="/favicon.ico"> <style> div.authorname { font-weight: 500; margin-bottom: .3rem; } div.author { margin-bottom: 1rem; } span.keyword { font-weight: 500; } span.keyword a { color: black; } div.reference { margin-bottom: .5rem; } ol.bib li:before { margin-left: -1.5rem; content: "[" counter(bcounter) "] "; margin-right: .5rem; } ol.bib { list-style: none; counter-reset: bcounter; } ol.bib li { counter-increment: bcounter; margin-bottom: .5rem; } .card-header { background-color: #d1e7dd !important; } .authorlist { /* border: 1px solid #aaa; padding: 1rem; margin-bottom: 1rem; background-color: white;*/ } </style> <script> MathJax = { tex: { inlineMath: [['$', '$'], ['\\(', '\\)']], displayMath: [ ['$$','$$'], ["\\[","\\]"] ], processEnvironments: false, processEscapes: true }, "HTML-CSS": { linebreaks: { automatic: true } } }; </script> <script id="MathJax-script" async src="/js/mathjax/tex-chtml.js"></script> <link rel="schema.DC" href="http://purl.org/dc/elements/1.1/"> <meta name="DC.Creator.PersonalName" content="Aurélien Dupin"> <meta name="DC.Creator.PersonalName" content="Simon Abelard"> <meta name="DC.Date.created" content="2024-04-09 19:26:57"> <meta name="DC.Date.dateSubmitted" content="2024-01-08"> <meta name="DC.Date.dateAccepted" content="2024-03-05"> <meta name="DC.Description" xml:lang="en" lang="en" content="&lt;p&gt; The problem of Broadcast Encryption (BE) consists in broadcasting an encrypted message to a large number of users or receiving devices in such a way that the emitter of the message can control which of the users can or cannot decrypt it.&lt;/p&gt;&lt;p&gt; Since the early 1990s, the design of BE schemes has received significant interest and many different concepts were proposed. A major breakthrough was achieved by Naor, Naor and Lotspiech (CRYPTO 2001) by partitioning cleverly the set of authorized users and associating a symmetric key to each subset. Since then, while there have been many advances in public-key based BE schemes, mostly based on bilinear maps, little was made on symmetric cryptography.&lt;/p&gt;&lt;p&gt; In this paper, we design a new symmetric-based BE scheme, named $\Sigma\Pi$BE, that relies on logic optimization and consensual security assumptions. It is competitive with the work of Naor et al. and provides a different tradeoff: the bandwidth requirement is significantly lowered at the cost of an increase in the key storage. &lt;/p&gt;"> <meta name="DC.Format" content="application/pdf"> <meta name="DC.Identifier.DOI" content="10.62056/av4fe0iuc"> <meta name="DC.Identifier.URI" content="https://cic.iacr.org/p/1/1/18"> <meta name="DC.Language" content="en"> <meta name="DC.Rights" content="Copyright (c) 2023 held by author(s)"> <meta name="DC.Rights" content="https://creativecommons.org/licenses/by/4.0/"> <meta name="DC.Source" content="IACR Communications in Cryptology"> <meta name="DC.Source.ISSN" content="3006-5496"> <meta name="DC.Source.Issue" content="1"> <meta name="DC.Source.Volume" content="1"> <meta name="DC.Subject" xml:lang="en" lang="en" content="Broadcast Encryption"> <meta name="DC.Subject" xml:lang="en" lang="en" content="Boolean Functions"> <meta name="DC.Title" content="Broadcast Encryption using Sum-Product decomposition of Boolean functions"> <meta name="DC.Type" content="Text.Serial.Journal"> <meta name="DC.Type.articleType" content="Articles"> <meta name="citation_journal_title" content="IACR Communications in Cryptology"> <meta name="citation_journal_abbrev" content="CiC"> <meta name="citation_issn" content="3006-5496"><meta name="citation_author" content="Aurélien Dupin"> <meta name="citation_author_institution" content="Thales SIX France"> <meta name="citation_author" content="Simon Abelard"> <meta name="citation_author_institution" content="Thales SIX France"> <meta name="citation_title" content="Broadcast Encryption using Sum-Product decomposition of Boolean functions"> <meta name="citation_language" content="en"> <meta name="citation_date" content="2024-04-09"> <meta name="citation_volume" content="1"> <meta name="citation_issue" content="1"> <meta name="citation_doi" content="10.62056/av4fe0iuc"> <meta name="citation_abstract_html_url" content="https://cic.iacr.org/p/1/1/18"> <meta name="citation_keywords" xml:lang="en" lang="en" content="Broadcast Encryption"><meta name="citation_keywords" xml:lang="en" lang="en" content="Boolean Functions"> <meta name="citation_pdf_url" content="https://cic.iacr.org/p/1/1/18/pdf"> </head> <body> <noscript> <h1 class="text-center">What a lovely hat</h1> <h4 class="text-center">Is it made out of <a href="https://iacr.org/tinfoil.html">tin foil</a>?</h4> </noscript> <div class="pageTop d-flex justify-content-md-around justify-content-between align-items-center"> <a href="https://iacr.org"><img id="logo" class="d-none d-lg-block ms-5" src="/images/iacrlogo_small.png" title="International Association for Cryptologic Research" alt="IACR logo"></a> <span class="headerTitle d-none d-md-block">Communications in Cryptology</span> <span class="headerTitle d-md-none">IACR CiC</span> <div class="dropdown ps-lg-2 me-5"> <button class="btn border-0" type="button" id="dropdownMenuButton1" data-bs-toggle="dropdown" aria-expanded="true"> <img src="/images/search.svg" class="searchIcon" alt="Search Button" style="width:33px;"> </button> <div id="searchDd" class="dropdown-menu dropdown-menu-end bg-transparent border-0" aria-labelledby="dropdownMenuButton1" data-bs-popper="none"> <form action="/search" method="GET" class="me-3"> <div class="input-group"> <input id="searchbox" name="q" type="search" class="form-control shadow-none" autocomplete="off" > <input type="hidden" name="d" value="/var/www/wsgi/cicjournal/webapp/search_index/xapian.db"> <button class="btn btn-outline-dark border border-dark input-group-append"> Search </button> </div> </form> <div id="results" class="bg-light"></div> </div> </div> </div> <nav id="sitenav" class="navbar navbar-expand-md"> <div class="container"> <button class="navbar-toggler" type="button" data-bs-toggle="collapse" data-bs-target="#collapseContent" aria-controls="collapseContent" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="collapse navbar-collapse" id="collapseContent"> <ul class="navbar-nav nav-fill w-100 justify-content-between"> <li class="nav-item"> <a class="nav-link active" aria-current="page" href="/">Home</a> </li> <li class="nav-item"> <a class="nav-link" href="/contents">Papers</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" role="button" data-bs-toggle="dropdown" aria-expanded="false"> Submissions </a> <ul class="dropdown-menu ms-3 ms-lg-5"> <li><a class="dropdown-item" href="/callforpapers">Call for papers</a></li> <li><a class="dropdown-item" href="/ethics">Publication ethics</a></li> <li><a class="dropdown-item" href="/irregular">Irregular submissions</a></li> <li><a class="dropdown-item" href="/conflicts">Conflict of interest</a></li> <li><a class="dropdown-item" href="/retraction">Retraction policy</a></li> </ul> </li> <li class="nav-item"> <a class="nav-link" href="/faq">FAQ</a> </li> <li class="nav-item"> <a class="nav-link" href="/contact">Contact</a> </li> <li class="nav-item"> <a class="nav-link" href="/board">Editorial board</a> </li> <li class="nav-item dropdown"> <a href="#" class="ms-md-5 nav-link dropdown-toggle" data-bs-toggle="dropdown"><img alt="Login" src="/images/user.svg"></a> <ul class="dropdown-menu"> <li><a href="/login" class="dropdown-item">Admin login</a></li> </ul> </li> </ul> </div> </div> </nav> <main id="mainContent" class="container"> <nav aria-label="breadcrumb" class="mt-3"> <ol class="breadcrumb"> <li class="breadcrumb-item"><a href="/">Home</a></li> <li class="breadcrumb-item"><a href="/v/1">Volume 1</a></li> <li class="breadcrumb-item"><a href="/i/1/1">Issue 1</a></li> <li class="breadcrumb-item active" aria-current="page">18</li> </ol> </nav> <h2>Broadcast Encryption using Sum-Product decomposition of Boolean functions</h2> <div class="row mt-3"> <div class="col-12 col-md-8"> <h3 class="mt-2">Authors</h3> <div class="fs-4 mb-4 mt-2 d-flex justify-content-between flex-column flex-lg-row"> <div>Aurélien Dupin, Simon Abelard</div> <button role="button" aria-expanded="false" aria-controls="authorlist" class="ms-4 btn me-3 dropdown-toggle" data-bs-toggle="collapse" data-bs-target="#authorlist">Author Info</button> </div> <div id="authorlist" class="authorlist collapse"> <div class="author"> <div class="authorname">Aurélien Dupin </div> <div class="ms-4 mb-2"> Thales SIX France, Gennevilliers, France<br> <span class="font-monospace">aurelien dot dupin at thalesgroup dot com</span> </div> </div> <div class="author"> <div class="authorname">Simon Abelard </div> <div class="ms-4 mb-2"> Thales SIX France, Gennevilliers, France<br> <span class="font-monospace">sabelard at protonmail dot com</span> </div> </div> </div> <div class="mb-3"> <strong class="fs-4">Keywords: </strong> <span class="badge p-2 text-bg-light keyword ms-2 my-1" alt="Broadcast Encryption" title="Broadcast Encryption"><a href="/search?q=Broadcast%20Encryption">Broadcast Encryption</a></span> <span class="badge p-2 text-bg-light keyword ms-2 my-1" alt="Boolean Functions" title="Boolean Functions"><a href="/search?q=Boolean%20Functions">Boolean Functions</a></span> </div> <h3 class="mt-4">Abstract</h3> <p><p> The problem of Broadcast Encryption (BE) consists in broadcasting an encrypted message to a large number of users or receiving devices in such a way that the emitter of the message can control which of the users can or cannot decrypt it.</p><p> Since the early 1990s, the design of BE schemes has received significant interest and many different concepts were proposed. A major breakthrough was achieved by Naor, Naor and Lotspiech (CRYPTO 2001) by partitioning cleverly the set of authorized users and associating a symmetric key to each subset. Since then, while there have been many advances in public-key based BE schemes, mostly based on bilinear maps, little was made on symmetric cryptography.</p><p> In this paper, we design a new symmetric-based BE scheme, named $\Sigma\Pi$BE, that relies on logic optimization and consensual security assumptions. It is competitive with the work of Naor et al. and provides a different tradeoff: the bandwidth requirement is significantly lowered at the cost of an increase in the key storage. </p></p> <h3 class="mb-3">References</h3> <div class="d-flex"> <div style="min-width:9rem;">[AWY20]</div> <div>Shweta Agrawal, Daniel Wichs, and Shota Yamada. Optimal broadcast encryption from <span class="bibtex-protected">LWE</span> and pairings in the standard model. In Rafael Pass and Krzysztof Pietrzak, editors, <em>Theory of Cryptography - 18th International Conference, <span class="bibtex-protected">TCC</span> 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part <span class="bibtex-protected">I</span></em>, volume 12550 of Lecture Notes in Computer Science, 149–178. Springer, 2020. <a href="https://doi.org/10.1007/978-3-030-64375-1_6">https://doi.org/10.1007/978-3-030-64375-1_6</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Agrawal%2C+Shweta%2C+Wichs%2C+Daniel%2C+and+%0AYamada%2C+Shota+Optimal+Broadcast+Encryption+from+%7BLWE%7D+and+Pairings+in+the+Standard+Model+2020" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Agrawal%2C+Shweta%2C+Wichs%2C+Daniel%2C+and+%0AYamada%2C+Shota&amp;title=Optimal+Broadcast+Encryption+from+%7BLWE%7D+and+Pairings+in+the+Standard+Model&amp;submittedafter=2019&amp;submittedbefore=2021" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BGW05]</div> <div>Dan Boneh, Craig Gentry, and Brent Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Victor Shoup, editor, <em>Advances in Cryptology - <span class="bibtex-protected">CRYPTO</span> 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings</em>, volume 3621 of Lecture Notes in Computer Science, 258–275. Springer, 2005. <a href="https://doi.org/10.1007/11535218_16">https://doi.org/10.1007/11535218_16</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Boneh%2C+Dan%2C+Gentry%2C+Craig%2C+and+%0AWaters%2C+Brent+Collusion+Resistant+Broadcast+Encryption+with+Short+Ciphertexts+and+Private+Keys+2005" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Boneh%2C+Dan%2C+Gentry%2C+Craig%2C+and+%0AWaters%2C+Brent&amp;title=Collusion+Resistant+Broadcast+Encryption+with+Short+Ciphertexts+and+Private+Keys&amp;submittedafter=2004&amp;submittedbefore=2006" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BHMS84]</div> <div>Robert&nbsp;K. Brayton, Gary&nbsp;D. Hachtel, Curtis&nbsp;T. McMullen, and Alberto&nbsp;L. Sangiovanni<span class="bibtex-protected">-</span>Vincentelli. <em>Logic Minimization Algorithms for <span class="bibtex-protected">VLSI</span> Synthesis</em>. Volume&nbsp;2 of The Kluwer International Series in Engineering and Computer Science. Springer, 1984. ISBN 978-1-4612-9784-0. <a href="https://doi.org/10.1007/978-1-4613-2821-6">https://doi.org/10.1007/978-1-4613-2821-6</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Brayton%2C+Robert+K.%2C+Hachtel%2C+Gary+D.%2C+McMullen%2C+Curtis+T.%2C+and+%0ASangiovanni-Vincentelli%2C+Alberto+L.+Logic+Minimization+Algorithms+for+%7BVLSI%7D+Synthesis+1984" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Brayton%2C+Robert+K.%2C+Hachtel%2C+Gary+D.%2C+McMullen%2C+Curtis+T.%2C+and+%0ASangiovanni-Vincentelli%2C+Alberto+L.&amp;title=Logic+Minimization+Algorithms+for+%7BVLSI%7D+Synthesis&amp;submittedafter=1983&amp;submittedbefore=1985" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BS13]</div> <div>Sanjay Bhattacherjee and Palash Sarkar. Complete tree subset difference broadcast encryption scheme and its analysis. <em>Des. Codes Cryptogr.</em>, 66(1-3):335–362, 2013. <a href="https://doi.org/10.1007/s10623-012-9702-6">https://doi.org/10.1007/s10623-012-9702-6</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Bhattacherjee%2C+Sanjay+and+Sarkar%2C+Palash+Complete+tree+subset+difference+broadcast+encryption+scheme+and+its+analysis+2013" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Bhattacherjee%2C+Sanjay+and+Sarkar%2C+Palash&amp;title=Complete+tree+subset+difference+broadcast+encryption+scheme+and+its+analysis&amp;submittedafter=2012&amp;submittedbefore=2014" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BS16]</div> <div>S.&nbsp;Bhattacherjee and P.&nbsp;Sarkar. Reducing communication overhead of the subset difference scheme. <em>IEEE Transactions on Computers</em>, 65(08):2575&ndash;2587, aug 2016. <a href="https://doi.org/10.1109/TC.2015.2485231">https://doi.org/10.1109/TC.2015.2485231</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Bhattacherjee%2C+S.+and+Sarkar%2C+P.+Reducing+Communication+Overhead+of+the+Subset+Difference+Scheme+2016" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Bhattacherjee%2C+S.+and+Sarkar%2C+P.&amp;title=Reducing+Communication+Overhead+of+the+Subset+Difference+Scheme&amp;submittedafter=2015&amp;submittedbefore=2017" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CFN61]</div> <div>A.&nbsp;Cobham, R.&nbsp;Fridshal, and J.&nbsp;H. North. An application of linear programming to the minimization of boolean functions. In <em>2nd Annual Symposium on Switching Circuit Theory and Logical Design (SWCT 1961)</em>, volume, 3&ndash;9. 1961. <a href="https://doi.org/10.1109/FOCS.1961.5">https://doi.org/10.1109/FOCS.1961.5</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Cobham%2C+A.%2C+Fridshal%2C+R.%2C+and+%0ANorth%2C+J.+H.+An+application+of+linear+programming+to+the+minimization+of+Boolean+functions+1961" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Cobham%2C+A.%2C+Fridshal%2C+R.%2C+and+%0ANorth%2C+J.+H.&amp;title=An+application+of+linear+programming+to+the+minimization+of+Boolean+functions&amp;submittedafter=1960&amp;submittedbefore=1962" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CM78]</div> <div>Ashok&nbsp;K. Chandra and George Markowsky. On the number of prime implicants. <em>Discret. Math.</em>, 24(1):7–11, 1978. <a href="https://doi.org/10.1016/0012-365X(78)90168-1">https://doi.org/10.1016/0012-365X(78)90168-1</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Chandra%2C+Ashok+K.+and+Markowsky%2C+George+On+the+number+of+prime+implicants+1978" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Chandra%2C+Ashok+K.+and+Markowsky%2C+George&amp;title=On+the+number+of+prime+implicants&amp;submittedafter=1977&amp;submittedbefore=1979" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[DF03]</div> <div>Yevgeniy Dodis and Nelly Fazio. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In Yvo Desmedt, editor, <em>Public Key Cryptography - <span class="bibtex-protected">PKC</span> 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings</em>, volume 2567 of Lecture Notes in Computer Science, 100–115. Springer, 2003. <a href="https://doi.org/10.1007/3-540-36288-6_8">https://doi.org/10.1007/3-540-36288-6_8</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Dodis%2C+Yevgeniy+and+Fazio%2C+Nelly+Public+Key+Trace+and+Revoke+Scheme+Secure+against+Adaptive+Chosen+Ciphertext+Attack+2003" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Dodis%2C+Yevgeniy+and+Fazio%2C+Nelly&amp;title=Public+Key+Trace+and+Revoke+Scheme+Secure+against+Adaptive+Chosen+Ciphertext+Attack&amp;submittedafter=2002&amp;submittedbefore=2004" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[DGB12]</div> <div>Renaud Dubois, Aurore Guillevic, and Marine Sengelin&nbsp;Le Breton. Improved broadcast encryption scheme with constant-size ciphertext. In Michel Abdalla and Tanja Lange, editors, <em>Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers</em>, volume 7708 of Lecture Notes in Computer Science, 196–202. Springer, 2012. <a href="https://doi.org/10.1007/978-3-642-36334-4_12">https://doi.org/10.1007/978-3-642-36334-4_12</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Dubois%2C+Renaud%2C+Guillevic%2C+Aurore%2C+and+%0ABreton%2C+Marine+Sengelin+Le+Improved+Broadcast+Encryption+Scheme+with+Constant-Size+Ciphertext+2012" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Dubois%2C+Renaud%2C+Guillevic%2C+Aurore%2C+and+%0ABreton%2C+Marine+Sengelin+Le&amp;title=Improved+Broadcast+Encryption+Scheme+with+Constant-Size+Ciphertext&amp;submittedafter=2011&amp;submittedbefore=2013" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[FN93]</div> <div>Amos Fiat and Moni Naor. Broadcast encryption. In Douglas&nbsp;R. Stinson, editor, <em>Advances in Cryptology - <span class="bibtex-protected">CRYPTO</span> '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings</em>, volume 773 of Lecture Notes in Computer Science, 480–491. Springer, 1993. <a href="https://doi.org/10.1007/3-540-48329-2_40">https://doi.org/10.1007/3-540-48329-2_40</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Fiat%2C+Amos+and+Naor%2C+Moni+Broadcast+Encryption+1993" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Fiat%2C+Amos+and+Naor%2C+Moni&amp;title=Broadcast+Encryption&amp;submittedafter=1992&amp;submittedbefore=1994" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[HS02]</div> <div>Dani Halevy and Adi Shamir. The <span class="bibtex-protected">LSD</span> broadcast encryption scheme. In Moti Yung, editor, <em>Advances in Cryptology - <span class="bibtex-protected">CRYPTO</span> 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings</em>, volume 2442 of Lecture Notes in Computer Science, 47–60. Springer, 2002. <a href="https://doi.org/10.1007/3-540-45708-9_4">https://doi.org/10.1007/3-540-45708-9_4</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Halevy%2C+Dani+and+Shamir%2C+Adi+The+%7BLSD%7D+Broadcast+Encryption+Scheme+2002" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Halevy%2C+Dani+and+Shamir%2C+Adi&amp;title=The+%7BLSD%7D+Broadcast+Encryption+Scheme&amp;submittedafter=2001&amp;submittedbefore=2003" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[KL14]</div> <div>Jonathan Katz and Yehuda Lindell. <em>Introduction to Modern Cryptography, Second Edition</em>. <span class="bibtex-protected">CRC</span> Press, 2014. ISBN 9781466570269.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Katz%2C+Jonathan+and+Lindell%2C+Yehuda+Introduction+to+Modern+Cryptography%2C+Second+Edition+2014" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Katz%2C+Jonathan+and+Lindell%2C+Yehuda&amp;title=Introduction+to+Modern+Cryptography%2C+Second+Edition&amp;submittedafter=2013&amp;submittedbefore=2015" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[KRS99]</div> <div>Ravi Kumar, Sridhar Rajagopalan, and Amit Sahai. Coding constructions for blacklisting problems without computational assumptions. In Michael&nbsp;J. Wiener, editor, <em>Advances in Cryptology - <span class="bibtex-protected">CRYPTO</span> '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings</em>, volume 1666 of Lecture Notes in Computer Science, 609–623. Springer, 1999. <a href="https://doi.org/10.1007/3-540-48405-1_38">https://doi.org/10.1007/3-540-48405-1_38</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Kumar%2C+Ravi%2C+Rajagopalan%2C+Sridhar%2C+and+%0ASahai%2C+Amit+Coding+Constructions+for+Blacklisting+Problems+without+Computational+Assumptions+1999" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Kumar%2C+Ravi%2C+Rajagopalan%2C+Sridhar%2C+and+%0ASahai%2C+Amit&amp;title=Coding+Constructions+for+Blacklisting+Problems+without+Computational+Assumptions&amp;submittedafter=1998&amp;submittedbefore=2000" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[NNL01]</div> <div>Dalit Naor, Moni Naor, and Jeffery Lotspiech. Revocation and tracing schemes for stateless receivers. In Joe Kilian, editor, <em>Advances in Cryptology - <span class="bibtex-protected">CRYPTO</span> 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings</em>, volume 2139 of Lecture Notes in Computer Science, 41–62. Springer, 2001. <a href="https://doi.org/10.1007/3-540-44647-8_3">https://doi.org/10.1007/3-540-44647-8_3</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Naor%2C+Dalit%2C+Naor%2C+Moni%2C+and+%0ALotspiech%2C+Jeffery+Revocation+and+Tracing+Schemes+for+Stateless+Receivers+2001" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Naor%2C+Dalit%2C+Naor%2C+Moni%2C+and+%0ALotspiech%2C+Jeffery&amp;title=Revocation+and+Tracing+Schemes+for+Stateless+Receivers&amp;submittedafter=2000&amp;submittedbefore=2002" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Pet56]</div> <div>Stanley&nbsp;R Petrick. <a href="https://books.google.fr/books?id=mgKnAQAACAAJ">A direct determination of the irredundant forms of a boolean function from the set of prime implicants.</a> <em>Air Force Cambridge Res. Center Tech. Report</em>, pages 56–110, 1956.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Petrick%2C+Stanley+R+A+direct+determination+of+the+irredundant+forms+of+a+Boolean+function+from+the+set+of+prime+implicants+1956" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Petrick%2C+Stanley+R&amp;title=A+direct+determination+of+the+irredundant+forms+of+a+Boolean+function+from+the+set+of+prime+implicants&amp;submittedafter=1955&amp;submittedbefore=1957" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[PPSS13]</div> <div>Duong&nbsp;Hieu Phan, David Pointcheval, Siamak&nbsp;Fayyaz Shahandashti, and Mario Strefler. Adaptive <span class="bibtex-protected">CCA</span> broadcast encryption with constant-size secret keys and ciphertexts. <em>Int. J. Inf. Sec.</em>, 12(4):251–265, 2013. <a href="https://doi.org/10.1007/s10207-013-0190-0">https://doi.org/10.1007/s10207-013-0190-0</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Phan%2C+Duong+Hieu%2C+Pointcheval%2C+David%2C+Shahandashti%2C+Siamak+Fayyaz%2C+and+%0AStrefler%2C+Mario+Adaptive+%7BCCA%7D+broadcast+encryption+with+constant-size+secret+keys+and+ciphertexts+2013" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Phan%2C+Duong+Hieu%2C+Pointcheval%2C+David%2C+Shahandashti%2C+Siamak+Fayyaz%2C+and+%0AStrefler%2C+Mario&amp;title=Adaptive+%7BCCA%7D+broadcast+encryption+with+constant-size+secret+keys+and+ciphertexts&amp;submittedafter=2012&amp;submittedbefore=2014" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[SDSP23]</div> <div>Vikas Srivastava, Sumit&nbsp;Kumar Debnath, Pantelimon Stanica, and Saibal&nbsp;Kumar Pal. A multivariate identity-based broadcast encryption with applications to the internet of things. <em>Adv. Math. Commun.</em>, 17(6):1302–1313, 2023. <a href="https://doi.org/10.3934/amc.2021050">https://doi.org/10.3934/amc.2021050</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Srivastava%2C+Vikas%2C+Debnath%2C+Sumit+Kumar%2C+Stanica%2C+Pantelimon%2C+and+%0APal%2C+Saibal+Kumar+A+multivariate+identity-based+broadcast+encryption+with+applications+to+the+internet+of+things+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Srivastava%2C+Vikas%2C+Debnath%2C+Sumit+Kumar%2C+Stanica%2C+Pantelimon%2C+and+%0APal%2C+Saibal+Kumar&amp;title=A+multivariate+identity-based+broadcast+encryption+with+applications+to+the+internet+of+things&amp;submittedafter=2022&amp;submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[TT01]</div> <div>Wen<span class="bibtex-protected">-</span>Guey Tzeng and Zhi<span class="bibtex-protected">-</span>Jia Tzeng. A public-key traitor tracing scheme with revocation using dynamic shares. In Kwangjo Kim, editor, <em>Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, <span class="bibtex-protected">PKC</span> 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings</em>, volume 1992 of Lecture Notes in Computer Science, 207–224. Springer, 2001. <a href="https://doi.org/10.1007/3-540-44586-2_16">https://doi.org/10.1007/3-540-44586-2_16</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Tzeng%2C+Wen-Guey+and+Tzeng%2C+Zhi-Jia+A+Public-Key+Traitor+Tracing+Scheme+with+Revocation+Using+Dynamic+Shares+2001" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Tzeng%2C+Wen-Guey+and+Tzeng%2C+Zhi-Jia&amp;title=A+Public-Key+Traitor+Tracing+Scheme+with+Revocation+Using+Dynamic+Shares&amp;submittedafter=2000&amp;submittedbefore=2002" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Wee22]</div> <div>Hoeteck Wee. Optimal broadcast encryption and <span class="bibtex-protected">CP-ABE</span> from evasive lattice assumptions. In Orr Dunkelman and Stefan Dziembowski, editors, <em>Advances in Cryptology - <span class="bibtex-protected">EUROCRYPT</span> 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part <span class="bibtex-protected">II</span></em>, volume 13276 of Lecture Notes in Computer Science, 217–241. Springer, 2022. <a href="https://doi.org/10.1007/978-3-031-07085-3_8">https://doi.org/10.1007/978-3-031-07085-3_8</a>.</div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&amp;q=Wee%2C+Hoeteck+Optimal+Broadcast+Encryption+and+%7BCP-ABE%7D+from+Evasive+Lattice+Assumptions+2022" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&amp;authors=Wee%2C+Hoeteck&amp;title=Optimal+Broadcast+Encryption+and+%7BCP-ABE%7D+from+Evasive+Lattice+Assumptions&amp;submittedafter=2021&amp;submittedbefore=2023" target="_blank" class="ms-3">ePrint</a> </div> </div> <div class="col-12 col-md-4"> <p class="mt-4"> <a class="btn btn-outline-dark" href="/p/1/1/18/pdf"><img alt="PDF" class="icon" src="/images/file-pdf.svg">PDF</a> <img style="margin-left: 1rem;max-width: 1.2rem;" src="/images/open_access.svg" title="Open access" alt="Open access"> </p> <div class="my-4"> <span class="fw-bold me-2">DOI:</span> <a href="https://doi.org/10.62056/av4fe0iuc">https://doi.org/10.62056/av4fe0iuc</a> </div> <div class="card mb-4"> <h5 class="card-header">History</h5> <div class="card-body"> <strong>Submitted</strong>: 2024-01-08<br> <strong>Accepted</strong>: 2024-03-05<br> <strong>Published</strong>: 2024-04-09<br> <!-- begin crossmark --> <script src="https://crossmark-cdn.crossref.org/widget/v2.0/widget.js"></script> <a data-target="crossmark"><img style="margin-top:4px;" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" width="150" /></a> <!-- end crossmark --> </div> </div> <div class="card mb-4"> <h5 class="card-header">How to cite</h5> <div class="card-body"> <p>Aurélien Dupin and Simon Abelard, Broadcast Encryption using Sum-Product decomposition of Boolean functions. <span class="fst-italic">IACR Communications in Cryptology</span>, vol. 1, no. 1, Apr 09, 2024, doi: 10.62056/av4fe0iuc. </p> <button type="button" id="citationModalLabel" class="float-end btn btn-outline-dark" data-bs-toggle="modal" data-bs-target="#citationModal"> BibTeX, etc </button> </div> </div> <div class="card mb-4"> <h5 class="card-header">Citations</h5> <div class="card-body"> <p>There is at least one citation.</p> <button type="button" id="citationsModalLabel" class="float-end btn btn-outline-dark" data-bs-toggle="modal" data-bs-target="#citationsModal">Show citations</button> </div> </div> <div class="card mb-4"> <h5 class="card-header">License</h5> <div class="card-body"> <p>Copyright is held by the author(s)</p> <p> This work is licensed under a <a target="_blank" href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution (CC BY)</a> license. </p> </div> </div> </div> </div> <div class="modal fade" id="citationModal" tabindex="-1" aria-labelledby="citationModalLabel" aria-hidden="true"> <div class="modal-dialog modal-xl"> <div class="modal-content"> <div class="modal-header"> <h1 class="modal-title fs-3">How to cite this</h1> <button type="button" class="btn-close" data-bs-dismiss="modal" aria-label="Close"></button> </div> <div class="modal-body p-4"> <ul class="nav nav-tabs" id="myTab" role="tablist"> <li class="nav-item" role="presentation"> <button class="nav-link active" id="bibtex-tab" data-bs-toggle="tab" data-bs-target="#bibtex-pane" type="button" role="tab" aria-controls="bibtex-pane" aria-selected="true">BibTeX</button> </li> <li class="nav-item" role="presentation"> <button class="nav-link" id="ris-tab" data-bs-toggle="tab" data-bs-target="#ris-pane" type="button" role="tab" aria-controls="ris-pane" aria-selected="false">RIS/Endnote/Zotero/Mendeley</button> </li> <li class="nav-item" role="presentation"> <button class="nav-link" id="text-tab" data-bs-toggle="tab" data-bs-target="#text-pane" type="button" role="tab" aria-controls="text-pane" aria-selected="false">Text</button> </li> </ul> <div class="tab-content p-4"> <div class="tab-pane active" id="bibtex-pane" role="tabpanel" aria-labelledby="bibtex-tab" tabindex="0"> <pre id="bib">@article{CiC-1-1-18, author = &#34;Dupin, Aurélien and Abelard, Simon&#34;, journal = &#34;{IACR} {C}ommunications in {C}ryptology&#34;, publisher = &#34;{I}nternational {A}ssociation for {C}ryptologic {R}esearch&#34;, title = &#34;Broadcast Encryption using Sum-Product decomposition of Boolean functions&#34;, volume = &#34;1&#34;, number = &#34;1&#34;, date = &#34;2024-04-09&#34;, year = &#34;2024&#34;, issn = &#34;3006-5496&#34;, doi = &#34;10.62056/av4fe0iuc&#34; } </pre> <button id="bibtexcopy" class="btn btn-sm btn-primary" aria-label="Copy to clipboard" onclick="copyMetadata('bibtexcopy', 'bib')">Copy to clipboard</button> <button id="bibtexdownload" class="ms-3 btn btn-sm btn-primary" aria-label="Download BibTeX .bib file" onclick="sendCitation('bib')">Download .bib file</button> </div> <div class="tab-pane" id="ris-pane" role="tabpanel" aria-labelledby="ris-tab" tabindex="0"> <pre id="ris">TY - JOUR AU - Dupin, Aurélien AU - Abelard, Simon PY - 2024 TI - Broadcast Encryption using Sum-Product decomposition of Boolean functions JF - IACR Communications in Cryptology JA - CIC VL - 1 IS - 1 DO - 10.62056/av4fe0iuc UR - https://doi.org/10.62056/av4fe0iuc AB - &lt;p&gt; The problem of Broadcast Encryption (BE) consists in broadcasting an encrypted message to a large number of users or receiving devices in such a way that the emitter of the message can control which of the users can or cannot decrypt it.&lt;/p&gt;&lt;p&gt; Since the early 1990s, the design of BE schemes has received significant interest and many different concepts were proposed. A major breakthrough was achieved by Naor, Naor and Lotspiech (CRYPTO 2001) by partitioning cleverly the set of authorized users and associating a symmetric key to each subset. Since then, while there have been many advances in public-key based BE schemes, mostly based on bilinear maps, little was made on symmetric cryptography.&lt;/p&gt;&lt;p&gt; In this paper, we design a new symmetric-based BE scheme, named $\Sigma\Pi$BE, that relies on logic optimization and consensual security assumptions. It is competitive with the work of Naor et al. and provides a different tradeoff: the bandwidth requirement is significantly lowered at the cost of an increase in the key storage. &lt;/p&gt; ER -</pre> <button id="riscopy" class="btn btn-sm btn-primary" aria-label="Copy to clipboard" onclick="copyMetadata('riscopy', 'ris')">Copy to clipboard</button> <button id="risdownload" class="ms-3 btn btn-sm btn-primary" aria-label="Download RIS file" onclick="sendCitation('ris')">Download .ris file</button> </div> <div class="tab-pane" id="text-pane" role="tabpanel" aria-labelledby="text-tab" tabindex="0"> <div class="w-75" id="textcitation">Aurélien Dupin and Simon Abelard, Broadcast Encryption using Sum-Product decomposition of Boolean functions. <span class="fst-italic">IACR Communications in Cryptology</span>, vol. 1, no. 1, Apr 09, 2024, doi: 10.62056/av4fe0iuc.</div> <button id="textcopy" class="btn btn-sm btn-primary mt-3" aria-label="Copy to clipboard" onclick="copyMetadata('textcopy', 'textcitation')">Copy to clipboard</button> </div> </div> </div> <div class="modal-footer"> <button type="button" class="btn btn-secondary" data-bs-dismiss="modal">Close</button> </div> </div> </div> </div> <div class="modal fade" id="citationsModal" tabindex="-1" aria-labelledby="citationsModalLabel" aria-hidden="true"> <div class="modal-dialog modal-dialog-scrollable modal-lg"> <div class="modal-content"> <div class="modal-header"> <h1 class="modal-title fs-3">Known citations</h1> <button type="button" class="btn-close" data-bs-dismiss="modal" aria-label="Close"></button> </div> <div class="modal-body p-4"> <p> We do not crawl the web, so we are only able to identify citations from papers that are registered with a DOI in crossref.org and the publisher reports their citations to crossref, and crossref can identify a DOI from the reference. That includes (most) articles from Springer and many from ACM, but it excludes citations from USENIX because they don't issue DOIs. It also excludes citations from arxiv and eprint. You may find more citations in <a href="https://scholar.google.com/scholar?hl=en&q=Broadcast+Encryption+using+Sum-Product+decomposition+of+Boolean+functions">Google Scholar</a>. </p> <ol> <li>Oliwer Sobolewski, Konrad Wrona, Adrian Cinal, Gabriel Wechta, Joanna Sliwa, Mateusz Leśniak, Michał Wroński, Miroslaw Kutylowski and Przemysław Kubiak. Quantum-Resistant Key Management for Underwater Acoustic Multicast Communication. <em>MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)</em> (2024), p. 196 DOI: <a href="https://doi.org/10.1109/MILCOM61039.2024.10773852" target="_blank">10.1109/MILCOM61039.2024.10773852</a></li> </ol> </div> <div class="modal-footer"> <button type="button" class="btn btn-secondary" data-bs-dismiss="modal">Close</button> </div> </div> </div> </div> <script> function copyMetadata(buttid, id) { let range = document.createRange(); range.selectNode(document.getElementById(id)); window.getSelection().removeAllRanges(); window.getSelection().addRange(range); document.execCommand('copy'); window.getSelection().removeAllRanges(); const copyTooltip = new bootstrap.Tooltip('#' + buttid, {trigger: 'manual', title: 'Copied!'}); copyTooltip.show(); setTimeout(function() { copyTooltip.dispose(); }, 2000); } function sendCitation(typ) { // typ is 'bib' or 'ris' let data = document.getElementById(typ).innerHTML; atag = document.createElement('a'); atag.setAttribute('href', 'data:text/plain;charset=utf-8,' + encodeURIComponent(data)); atag.setAttribute('download', '1-1-18.' + typ); if (document.createEvent) { let event = document.createEvent('MouseEvents'); event.initEvent('click', true, true); atag.dispatchEvent(event); } else { atag.click(); } } </script> </main> <div class="container-fluid mt-auto" id="pageFooter"> </div> <footer class="text-center footer py-3"> <small> <a href="https://iacr.org/copyright.html">Copyright © 2025</a> <span class="d-none d-md-inline">by the </span><span class="d-md-none">IACR</span> <span class="d-none d-md-inline">International Association for Cryptologic Research</span> <span class="d-none d-md-inline">• </span><br class="d-md-none"> <a href="https://iacr.org/privacy.html">Privacy Policy</a> </small> </footer> <script id="results-template" type="text/x-handlebars-template"> <div class="p-3 shadow" style="margin-bottom:1rem;max-height:70vh;overflow-y:scroll"> <p>{{estimated_results}} results (if more than 100, then refine your query)</p> <ol> {{#each results}} <li role="presentation"><a href="{{url}}">{{title}}</a><br> {{#each authors }}{{this}}{{#unless @last}}, {{/unless}}{{/each}}</li> {{/each}} </ol> </div> </script> <script src="/static/js/handlebars-v4.7.7.js"></script> <script> var theTemplateScript = document.getElementById('results-template').innerHTML; var resultsTemplate = Handlebars.compile(theTemplateScript); var textinput = document.getElementById('searchbox'); // Returns a function, that, as long as it continues to be invoked, will not // be triggered. The function will be called after it stops being called for // N milliseconds. If `immediate` is passed, trigger the function on the // leading edge, instead of the trailing. function debounce(func, wait, immediate) { var timeout; return function() { var context = this, args = arguments; var later = function() { timeout = null; if (!immediate) func.apply(context, args); }; var callNow = immediate && !timeout; clearTimeout(timeout); timeout = setTimeout(later, wait); if (callNow) func.apply(context, args); }; }; let controller; let signal; var doSearch = debounce(function() { args = {'d': '/var/www/wsgi/cicjournal/webapp/search_index/xapian.db'} if (textinput.value) { args['q'] = textinput.value; if (controller !== undefined) { console.log('killing'); controller.abort(); } controller = new AbortController(); signal = controller.signal; let search_url = "https://cic.iacr.org/api/search" + "?" + new URLSearchParams(args); console.log(search_url); fetch(search_url, {signal}) .then((response) => response.json()) .then((data) => { console.log(data); let elem = document.getElementById('view'); if (elem) {elem.innerHTML = '';} if (data.results.length > 0) { document.getElementById('results').innerHTML = resultsTemplate(data); } else { document.getElementById('results').innerHTML = '<div class="p-3 shadow">no results</div>'; } controller = undefined; }).catch((error) => { console.log('error in fetch'); console.log(error); }); } else { console.log('no query'); } }, 500); // only after 250 ms. document.querySelectorAll('input').forEach((elem) => { elem.addEventListener('input', doSearch); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10