Broadcast encryption
A broadcast encryption (BE) scheme allows a sender to encrypt a single message to an arbitrary subset of registered users such that only users in can decrypt. Users not in (revoked users) obtain no information about the plaintext, even if they collude. BE is optimized for one-to-many transmission, and the primary efficiency concern is ciphertext growth as (or the complement ) grows.
Syntax
A BE scheme is a tuple of efficient algorithms for users with message space and ciphertext space :
- is a randomized algorithm that takes the security parameter and user count , outputting public parameters and master secret key ,
- is a (possibly randomized) algorithm that takes and user index , outputting a secret key for user ,
- is a randomized algorithm that takes , a recipient set , and , outputting ,
- is a deterministic algorithm that takes , a secret key , and , outputting or .
Properties
Correctness
A BE scheme is -correct if for all , , , and ,
over , , and the randomness of .
IND-BE-CPA Security
In the adaptive game, the adversary freely queries to obtain keys for any users of its choice, then submits a challenge set and two messages. The only constraint is that the adversary may not hold a key for any user in .
\begin{algorithm}
\algname{Game}
\caption{$\Game^{\mathrm{be\text{-}cpa}}_{\mathsf{BE},\calA}(\secpar)$}
\begin{algorithmic}
\State $(\pp, \msk) \gets \Setup(1^\secpar, n)$; $b \getsr \bits$
\State $\calO_{\mathrm{key}}(i) := \KeyGen(\msk, i)$
\State $(S^*, m_0, m_1, \stA) \gets \calA^{\calO_{\mathrm{key}}}(1^\secpar, \pp)$
\Comment{$\calA$ may not have queried $\calO_{\mathrm{key}}(i)$ for any $i \in S^*$}
\State $c^* \gets \Enc(\pp, S^*, m_b)$
\State $b' \gets \calA^{\calO_{\mathrm{key}}}(c^*, \stA)$
\Comment{$\calA$ may not query $\calO_{\mathrm{key}}(i)$ for any $i \in S^*$}
\Return $[b' = b]$
\end{algorithmic}
\end{algorithm}
A BE scheme is IND-BE-CPA-secure if for all efficient admissible ,
is negligible. The admissibility constraint requires full collusion resistance: revoked users may pool their keys and still learn nothing about .
IND-sBE-CPA Security (Selective)
In the selective variant, the adversary commits to before runs.
Variations
Revocation schemes
Revocation schemes parametrize by the complement: the set of revoked (excluded) users rather than the authorized set . Efficiency is then measured in rather than .
Public-key broadcast encryption
In the public-key setting, anyone can encrypt to any set using only the public parameters ; key distribution is the only secret operation. This is the setting of BGW05.
Other results
- BE is a special case of CP-ABE with set-membership policies: the access policy is a monotone DNF formula
- BE is orthogonal to IBE in expressiveness: IBE matches a single identity exactly, while BE handles arbitrary subsets; neither is a special case of the other
- BGW05 achieves ciphertext size (independent of or ) under a bilinear Diffie-Hellman variant — BGW05