Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 1/2017

20.11.2015

Attribute-based signcryption with hybrid access policy

verfasst von: Gang Yu, Zhenfu Cao

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Attribute-based signcryption (ABSC) can fulfill the functionality of attribute-based signature (ABS) and attribute-based encryption (ABE) in a logical step. Depending on whether the access policy is embedded in the keys or ciphertexts, ABS and ABE are generally divided into two types: key policy and ciphertext policy. In this paper, we propose an ABSC scheme supporting key policy signature and ciphertext policy encryption, called KCP-ABSC, which is the first ABSC scheme with hybrid access policy to our known. The proposed KCP-ABSC scheme is proven to be ciphertext indistinguishability under chosen ciphertext attacks and achieves existential unforgeability under chosen message attack in the standard model. Furthermore, the size of the ciphertext in the new KCP-ABSC scheme is constant, i.e., independent of the number of attributes used in the system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity based encryption [A]. In: Advances in Cryptology—EUROCRYPT 2005, LNCS 3494[C]. Springer-Verlag, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity based encryption [A]. In: Advances in Cryptology—EUROCRYPT 2005, LNCS 3494[C]. Springer-Verlag, pp 457–473
2.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data[A]. In: Proceedings of ACM Conference on Computer and Communication Security—CCS 2006[C]. ACM Press, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data[A]. In: Proceedings of ACM Conference on Computer and Communication Security—CCS 2006[C]. ACM Press, pp 89–98
3.
Zurück zum Zitat Cheung L, Newport C (2007) Provably secure ciphertext-policy ABE [A]. In: Proceedings of ACM Conference on Computer and Communication Security—CCS 2007[C]. ACM Press, pp 456–465 Cheung L, Newport C (2007) Provably secure ciphertext-policy ABE [A]. In: Proceedings of ACM Conference on Computer and Communication Security—CCS 2007[C]. ACM Press, pp 456–465
4.
Zurück zum Zitat Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[A]. In: Advances in Cryptology—EUROCRYPT 2010, LNCS 6110[C]. Springer-Verlag, pp 62–91 Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[A]. In: Advances in Cryptology—EUROCRYPT 2010, LNCS 6110[C]. Springer-Verlag, pp 62–91
5.
Zurück zum Zitat Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization[M], Public Key Cryptography–PKC 2011. Springer, Berlin Heidelberg, pp 53–70MATH Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization[M], Public Key Cryptography–PKC 2011. Springer, Berlin Heidelberg, pp 53–70MATH
6.
Zurück zum Zitat Lewko A, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques[A]. In: Advances in Cryptology—CRYPTO 2012, LNCS 7417[C]. Springer-Verlag, pp 180–198 Lewko A, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques[A]. In: Advances in Cryptology—CRYPTO 2012, LNCS 7417[C]. Springer-Verlag, pp 180–198
7.
Zurück zum Zitat Ge A, Zhang R, Chen C, Ma C, Zhang Z (2012) Threshold ciphertext-policy attribute-based encryption with constant-size ciphertexts[A]. In: Proceedings of Australasian Conference on Information Security and Privacy—ACISP 2012, LNCS 7372[C]. Springer-Verlag, pp 336–349 Ge A, Zhang R, Chen C, Ma C, Zhang Z (2012) Threshold ciphertext-policy attribute-based encryption with constant-size ciphertexts[A]. In: Proceedings of Australasian Conference on Information Security and Privacy—ACISP 2012, LNCS 7372[C]. Springer-Verlag, pp 336–349
8.
Zurück zum Zitat Garg S, Gentry C, Halevi S et al (2013) Attribute-based encryption for circuits from multilinear maps[M], advances in Cryptology–CRYPTO 2013. Springer, Berlin Heidelberg, pp 479–499MATH Garg S, Gentry C, Halevi S et al (2013) Attribute-based encryption for circuits from multilinear maps[M], advances in Cryptology–CRYPTO 2013. Springer, Berlin Heidelberg, pp 479–499MATH
9.
Zurück zum Zitat Hohenberger S, Waters B (2014) Online/offline attribute-based encryption[M], Public-Key Cryptography–PKC 2014. Springer, Berlin Heidelberg, pp 293–310CrossRefMATH Hohenberger S, Waters B (2014) Online/offline attribute-based encryption[M], Public-Key Cryptography–PKC 2014. Springer, Berlin Heidelberg, pp 293–310CrossRefMATH
10.
Zurück zum Zitat Horváth M (2015) Attribute-based encryption optimized for cloud computing[M], SOFSEM: theory and practice of computer science. Springer, Berlin Heidelberg, pp 566–577MATH Horváth M (2015) Attribute-based encryption optimized for cloud computing[M], SOFSEM: theory and practice of computer science. Springer, Berlin Heidelberg, pp 566–577MATH
11.
Zurück zum Zitat Qin B, Deng H, Wu Q et al (2015) Flexible attribute-based encryption applicable to secure e-healthcare records[J]. Int J Inf Secur 1–13 Qin B, Deng H, Wu Q et al (2015) Flexible attribute-based encryption applicable to secure e-healthcare records[J]. Int J Inf Secur 1–13
13.
Zurück zum Zitat Shahandashti S, Safavi-Naini R (2009) Threshold attribute-based signatures and their application to anonymous credential systems[A]. In: Advances in Cryptology—AFRICACRYPT 2009, LNCS 5580[C]. Springer-Verlag, pp 178–193 Shahandashti S, Safavi-Naini R (2009) Threshold attribute-based signatures and their application to anonymous credential systems[A]. In: Advances in Cryptology—AFRICACRYPT 2009, LNCS 5580[C]. Springer-Verlag, pp 178–193
15.
Zurück zum Zitat Okamoto T, Takashima K (2011) Efficient attribute-based signatures for nonmonotone predicates in the standard model[A]. In: Proceedings of Public Key Cryptology—PKC 2011, LNCS 6571[C]. Springer-Verlag, pp 35–52 Okamoto T, Takashima K (2011) Efficient attribute-based signatures for nonmonotone predicates in the standard model[A]. In: Proceedings of Public Key Cryptology—PKC 2011, LNCS 6571[C]. Springer-Verlag, pp 35–52
16.
Zurück zum Zitat Ge A, Ma C, Zhang Z (2012) Attribute-based signature with constant-size signature in the standard model[J]. IET Inf Secur 6(2):47–54CrossRef Ge A, Ma C, Zhang Z (2012) Attribute-based signature with constant-size signature in the standard model[J]. IET Inf Secur 6(2):47–54CrossRef
17.
Zurück zum Zitat Herranz J, Laguillaumie F, Libert B, Rafols C (2012) Short attribute-based signatures for threshold predicates[A]. In: Proceedings of Topics in Cryptology—CT-RSA 2012, LNCS 7178[C]. Springer-Verlag, pp 51–67 Herranz J, Laguillaumie F, Libert B, Rafols C (2012) Short attribute-based signatures for threshold predicates[A]. In: Proceedings of Topics in Cryptology—CT-RSA 2012, LNCS 7178[C]. Springer-Verlag, pp 51–67
18.
Zurück zum Zitat Okamoto T, Takashima K (2013) Decentralized attribute-based signature[A]. In: Proceedings of Public Key Cryptology—PKC 2013, LNCS 7778[C]. Springer-Verlag, pp 125–142 Okamoto T, Takashima K (2013) Decentralized attribute-based signature[A]. In: Proceedings of Public Key Cryptology—PKC 2013, LNCS 7778[C]. Springer-Verlag, pp 125–142
19.
Zurück zum Zitat Sreenivasa Rao Y, Dutta R (2014) Expressive bandwidth-efficient attribute based signature and signcryption in standard model. Inf Secur Priv Lect Notes Comput Sci 8544:209–225CrossRefMATH Sreenivasa Rao Y, Dutta R (2014) Expressive bandwidth-efficient attribute based signature and signcryption in standard model. Inf Secur Priv Lect Notes Comput Sci 8544:209–225CrossRefMATH
20.
Zurück zum Zitat Zheng YL (1997) Digital signcryption or how to achieve cost (signature & encryption ≤ cost (signature) + cost (encryption) [A]. In: Advances in Cryptology-Crypto’97 [C], LNCS 1294, Berlin: Springer-Verlag, pp 165–179 Zheng YL (1997) Digital signcryption or how to achieve cost (signature & encryption ≤ cost (signature) + cost (encryption) [A]. In: Advances in Cryptology-Crypto’97 [C], LNCS 1294, Berlin: Springer-Verlag, pp 165–179
21.
Zurück zum Zitat Gagne M, Narayan S, Safavi-Naini R (2010) Threshold attribute-based signcryption[C]. Proceedings of the 7th International Conference on Security and Cryptography for Networks, Amalfi, Italy, Sep. 13–15, 2010, LNCS 6280, pp 154–171 Gagne M, Narayan S, Safavi-Naini R (2010) Threshold attribute-based signcryption[C]. Proceedings of the 7th International Conference on Security and Cryptography for Networks, Amalfi, Italy, Sep. 13–15, 2010, LNCS 6280, pp 154–171
22.
Zurück zum Zitat Emura K, Miyaji A, Rahman MS (2011) Toward dynamic attribute-based signcryption(Poster)[C]. Proceedings of the 16th Australasian Conference on Information Security and Privacy, Melbourne, Australia, July 11–13, 2011, LNCS 6812, pp 439–443 Emura K, Miyaji A, Rahman MS (2011) Toward dynamic attribute-based signcryption(Poster)[C]. Proceedings of the 16th Australasian Conference on Information Security and Privacy, Melbourne, Australia, July 11–13, 2011, LNCS 6812, pp 439–443
23.
Zurück zum Zitat Chen C, Chen J, Lim HW, Zhang Z, Feng D (2012) Combined public-key schemes:the case of ABE and ABS. In: Takagi T, Wang G, Qin Z, Jiang S, Yu Y (eds) ProvSec 2012. LNCS, vol 7496, pp 53–69 Chen C, Chen J, Lim HW, Zhang Z, Feng D (2012) Combined public-key schemes:the case of ABE and ABS. In: Takagi T, Wang G, Qin Z, Jiang S, Yu Y (eds) ProvSec 2012. LNCS, vol 7496, pp 53–69
24.
Zurück zum Zitat Wang C-J, Huang J-S, Lin W-L, Lin H-T (2013) Security analysis of Gagne et al.’s threshold attribute-based signcryption scheme. Intelligent networking and collaborative systems, 5th International Conference on Intelligent Networking and Collaborative Systems, pp 103–108 Wang C-J, Huang J-S, Lin W-L, Lin H-T (2013) Security analysis of Gagne et al.’s threshold attribute-based signcryption scheme. Intelligent networking and collaborative systems, 5th International Conference on Intelligent Networking and Collaborative Systems, pp 103–108
25.
Zurück zum Zitat Han Y, Lu W, Yang X (2013) Attribute-based signcryption scheme with non-monotonic access structure. Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on 9–11 Sept. 2013, pp 796–802 Han Y, Lu W, Yang X (2013) Attribute-based signcryption scheme with non-monotonic access structure. Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on 9–11 Sept. 2013, pp 796–802
26.
Zurück zum Zitat Pandit T, Kumar Pandey S, Barua R (2014) Attribute-based signcryption : signer privacy, strong unforgeability and IND-CCA2 security in adaptive-predicates attack, provable security. Lect Notes Comput Sci 8782:274–290CrossRefMATHMathSciNet Pandit T, Kumar Pandey S, Barua R (2014) Attribute-based signcryption : signer privacy, strong unforgeability and IND-CCA2 security in adaptive-predicates attack, provable security. Lect Notes Comput Sci 8782:274–290CrossRefMATHMathSciNet
27.
Zurück zum Zitat Sreenivasa Rao Y, Dutta R (2014) Expressive attribute based signcryption with constant-size ciphertext, progress in cryptology–AFRICACRYPT 2014. Lect Notes Comput Sci 8469:398–419CrossRefMATH Sreenivasa Rao Y, Dutta R (2014) Expressive attribute based signcryption with constant-size ciphertext, progress in cryptology–AFRICACRYPT 2014. Lect Notes Comput Sci 8469:398–419CrossRefMATH
28.
Zurück zum Zitat Selvi SSD, Vivek SS, Vinayagamurthy D, Rangan CP (2012) ID based signcryption scheme in standard model. In: Takagi T, Wang G, Qin Z, Jiang S, Yu Y (eds) ProvSec 2012. LNCS 7496, pp 35–52 Selvi SSD, Vivek SS, Vinayagamurthy D, Rangan CP (2012) ID based signcryption scheme in standard model. In: Takagi T, Wang G, Qin Z, Jiang S, Yu Y (eds) ProvSec 2012. LNCS 7496, pp 35–52
29.
Zurück zum Zitat Malone-Lee J (2005) A general construction for simultaneous signing and encrypting [M], cryptography and coding. Springer, Berlin Heidelberg, pp 116–135MATH Malone-Lee J (2005) A general construction for simultaneous signing and encrypting [M], cryptography and coding. Springer, Berlin Heidelberg, pp 116–135MATH
30.
Zurück zum Zitat Zhang R (2007) Tweaking TBE/IBE to PKE transforms with chameleon hash functions[A]. In: Proceedings of Applied Cryptography Networks Security-ACNS 2007, LNCS 4521[C], Springer-Verlag, pp 323–339 Zhang R (2007) Tweaking TBE/IBE to PKE transforms with chameleon hash functions[A]. In: Proceedings of Applied Cryptography Networks Security-ACNS 2007, LNCS 4521[C], Springer-Verlag, pp 323–339
31.
Zurück zum Zitat Lai J, Deng R, Liu S, Kou W (2010) Efficient CCA-secure PKE from identity-based techniques[A]. In: Proceedings of Topics in Cryptology—CT-RSA 2010, LNCS 5985[C], Springer-Verlag, pp 132–147 Lai J, Deng R, Liu S, Kou W (2010) Efficient CCA-secure PKE from identity-based techniques[A]. In: Proceedings of Topics in Cryptology—CT-RSA 2010, LNCS 5985[C], Springer-Verlag, pp 132–147
Metadaten
Titel
Attribute-based signcryption with hybrid access policy
verfasst von
Gang Yu
Zhenfu Cao
Publikationsdatum
20.11.2015
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 1/2017
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-015-0423-2

Weitere Artikel der Ausgabe 1/2017

Peer-to-Peer Networking and Applications 1/2017 Zur Ausgabe