Skip to main content
Top
Published in: Wireless Personal Communications 2/2017

24-10-2016

A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks

Authors: Hanshu Hong, Zhixin Sun

Published in: Wireless Personal Communications | Issue 2/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Attribute based signcryption (ABSC) combines the merits of ABE and ABS, which can provide both confidentiality and authentication in a single step. In this paper, we present a key insulated ciphertext policy attribute based signcryption scheme (KI-CP-ABSC) for data protection in wireless networks. In our scheme, a target access structure is embedded into ciphertexts, while user’s private key corresponds an attribute set. Only the two are matched can a receiver decrypt the ciphertexts and verify whether it is from valid data signer. We introduce key insulation mechanism into our scheme by dividing the system lifetime into several time periods. When key exposure happens, the system will evolve into the next time period to preserve the forward security. We eliminate bilinear parings in our KI-CP-ABSC thus the computation burden on the terminal devices are reduced sharply. The high efficiency and proved security make our KI-CP-ABSC a promising tool for secure data sharing in wireless environments.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In EUROCRYPT 2005, lecture notes in computer science (Vol. 3494, pp. 457–473). Heidelberg: Springer. Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In EUROCRYPT 2005, lecture notes in computer science (Vol. 3494, pp. 457–473). Heidelberg: Springer.
2.
go back to reference Goyal, V., Pandey, O., & Sahai, A. (2006). Attribute based encryption for fine-grained access control of encrypted data. In ACM conference on computer and communications security (pp. 89–98). New York: ACM. Goyal, V., Pandey, O., & Sahai, A. (2006). Attribute based encryption for fine-grained access control of encrypted data. In ACM conference on computer and communications security (pp. 89–98). New York: ACM.
3.
go back to reference Waters, B. (2011). Ciphertext policy attribute based encryption: An expressive, efficient, and provably secure realization. In PKC 2011, lecture notes in computer science (Vol. 6571, pp. 53–70). Heidelberg: Springer. Waters, B. (2011). Ciphertext policy attribute based encryption: An expressive, efficient, and provably secure realization. In PKC 2011, lecture notes in computer science (Vol. 6571, pp. 53–70). Heidelberg: Springer.
4.
go back to reference Lewko, A., Okamoto, T., Sahai, A., & Takashima, K. (2010). Fully secure functional encryption: Attribute based encryption and (hierarchical) inner product encryption. In EUROCRYPT 2010, lecture notes in computer science (Vol. 6110, pp. 62–91). Heidelberg: Springer. Lewko, A., Okamoto, T., Sahai, A., & Takashima, K. (2010). Fully secure functional encryption: Attribute based encryption and (hierarchical) inner product encryption. In EUROCRYPT 2010, lecture notes in computer science (Vol. 6110, pp. 62–91). Heidelberg: Springer.
5.
go back to reference Goyal, V., Jain, A., Pandey, O., & Sahai, A. (2008). Bounded ciphertext policy attribute based encryption, In 35th international colloquium, lecture notes in computer science (Vol. 5126, pp. 579–591). Heidelberg: Springer. Goyal, V., Jain, A., Pandey, O., & Sahai, A. (2008). Bounded ciphertext policy attribute based encryption, In 35th international colloquium, lecture notes in computer science (Vol. 5126, pp. 579–591). Heidelberg: Springer.
7.
go back to reference Guo, S. Q., & Zeng, Y. P. (2008). Attribute based signature scheme. In International conference on information security and assurance 2008, IEEE, pp. 509–511. Guo, S. Q., & Zeng, Y. P. (2008). Attribute based signature scheme. In International conference on information security and assurance 2008, IEEE, pp. 509–511.
8.
go back to reference Maji, H., Prabhakaran, M., & Rosulek, M. (2011). Attribute based signatures. In CT-RSA 2011 (pp. 376–392). Heidelberg: Springer. Maji, H., Prabhakaran, M., & Rosulek, M. (2011). Attribute based signatures. In CT-RSA 2011 (pp. 376–392). Heidelberg: Springer.
9.
go back to reference Zheng, Y. L. (1997). Digital signcryption or how to achieve cost (signature & encryption) ≪cost (signature) + cost (encryption). In CRYPTO’97. Lecture notes in computer science (Vol. 1294, pp.165–179). Heidelberg: Springer. Zheng, Y. L. (1997). Digital signcryption or how to achieve cost (signature & encryption) ≪cost (signature) + cost (encryption). In CRYPTO’97. Lecture notes in computer science (Vol. 1294, pp.165–179). Heidelberg: Springer.
10.
go back to reference Zhu, G., Xiong, H., & Qin, Z. (2014). Fully secure identity based key-insulated signcryption in the standard model. Wireless Personal Communications, 79(2), 1401–1416.CrossRef Zhu, G., Xiong, H., & Qin, Z. (2014). Fully secure identity based key-insulated signcryption in the standard model. Wireless Personal Communications, 79(2), 1401–1416.CrossRef
11.
go back to reference Li, F. G., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.MathSciNetCrossRefMATH Li, F. G., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.MathSciNetCrossRefMATH
12.
go back to reference Shi, W. B., Kumar, N., Gong, P., & Zhang, Z. Z. (2014). Cryptanalysis and improvement of a certificate less signcryption scheme without bilinear pairing. Frontiers of Computer Science, 8(4), 656–666.CrossRefMATH Shi, W. B., Kumar, N., Gong, P., & Zhang, Z. Z. (2014). Cryptanalysis and improvement of a certificate less signcryption scheme without bilinear pairing. Frontiers of Computer Science, 8(4), 656–666.CrossRefMATH
13.
go back to reference Wang, C. J., & Huang, J. S. (2011). Attribute based signcryption with ciphertext policy and claim predicate mechanism. In CIS 2011, pp. 905–909, IEEE. Wang, C. J., & Huang, J. S. (2011). Attribute based signcryption with ciphertext policy and claim predicate mechanism. In CIS 2011, pp. 905–909, IEEE.
14.
go back to reference Hu, C. Q., & Zhang, N. (2013). Body area network security: A fuzzy attribute based signcryption scheme. IEEE Journal on Selected Areas in Communications, 31(9), 37–46.CrossRef Hu, C. Q., & Zhang, N. (2013). Body area network security: A fuzzy attribute based signcryption scheme. IEEE Journal on Selected Areas in Communications, 31(9), 37–46.CrossRef
15.
go back to reference Liu, Z. H., Hu, Y. P., Zhang, X. S., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.MathSciNetCrossRefMATH Liu, Z. H., Hu, Y. P., Zhang, X. S., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.MathSciNetCrossRefMATH
16.
go back to reference Hong, H. S., & Sun, Z. X. (2016). An efficient and secure attribute based signcryption scheme with LSSS access structure. Springerplus, 5(644), 1–10. Hong, H. S., & Sun, Z. X. (2016). An efficient and secure attribute based signcryption scheme with LSSS access structure. Springerplus, 5(644), 1–10.
17.
go back to reference Hu, C. Q., Cheng, X. Z., & Tian, Z. (2016). An attribute-based signcryption scheme to secure attribute-defined multicast communications. In 11th secureComm. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering (Vol. 164, pp. 418–437). Heidelberg: Springer. Hu, C. Q., Cheng, X. Z., & Tian, Z. (2016). An attribute-based signcryption scheme to secure attribute-defined multicast communications. In 11th secureComm. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering (Vol. 164, pp. 418–437). Heidelberg: Springer.
18.
go back to reference Peng, C. G., Wang, W. R., & Tian, Y. L. (2016). An attribute-based signcryption scheme and its application in information hiding. Chinese Journal of Electronics, 25(4), 632–640.CrossRef Peng, C. G., Wang, W. R., & Tian, Y. L. (2016). An attribute-based signcryption scheme and its application in information hiding. Chinese Journal of Electronics, 25(4), 632–640.CrossRef
19.
go back to reference Chen, J., Chen, K., & Wang, Y. (2012). Identity-based key-insulated signcryption. Informatica, 23, 27–45.MathSciNetMATH Chen, J., Chen, K., & Wang, Y. (2012). Identity-based key-insulated signcryption. Informatica, 23, 27–45.MathSciNetMATH
20.
go back to reference Attrapadung, N., Libert, B., & DePanafieu, E. (2011). Expressive key-policy attribute based encryption with constant-size ciphertexts. In PKC 2011, lecture notes in computer science (Vol. 6571, pp. 90–108). Heidelberg: Springer. Attrapadung, N., Libert, B., & DePanafieu, E. (2011). Expressive key-policy attribute based encryption with constant-size ciphertexts. In PKC 2011, lecture notes in computer science (Vol. 6571, pp. 90–108). Heidelberg: Springer.
21.
go back to reference Yu, S., Wang, C., & Ren, K. (2010). Attribute based data sharing with attribute revocation. In Proceedings of the 5th symposium on information, computer and communications security, pp. 261–270. New York: ACM. Yu, S., Wang, C., & Ren, K. (2010). Attribute based data sharing with attribute revocation. In Proceedings of the 5th symposium on information, computer and communications security, pp. 261–270. New York: ACM.
22.
go back to reference Junbeom, H. (2013). Improving security and efficiency in attribute based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271–2282.CrossRef Junbeom, H. (2013). Improving security and efficiency in attribute based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271–2282.CrossRef
23.
go back to reference Zhu, G., Xiong, H., Wang, R., & Qin, Z. (2014). An improvement of an identity-based key-insulated signcryption. In Proceedings of international conference on computer science and information technology advances in intelligent systems and computing, Vol. 255, pp. 97–104. Zhu, G., Xiong, H., Wang, R., & Qin, Z. (2014). An improvement of an identity-based key-insulated signcryption. In Proceedings of international conference on computer science and information technology advances in intelligent systems and computing, Vol. 255, pp. 97–104.
24.
go back to reference Hong, H. S., & Sun, Z. X. (2016). High efficient key-insulated attribute based encryption scheme without bilinear pairing operations. Springerplus, 5(131), 1–12. Hong, H. S., & Sun, Z. X. (2016). High efficient key-insulated attribute based encryption scheme without bilinear pairing operations. Springerplus, 5(131), 1–12.
25.
go back to reference Yin, A., & Liang, H. (2015). On security of a certificateless hybrid signcryption scheme. Wireless Personal Communications, 85(4), 1727–1739.MathSciNetCrossRef Yin, A., & Liang, H. (2015). On security of a certificateless hybrid signcryption scheme. Wireless Personal Communications, 85(4), 1727–1739.MathSciNetCrossRef
26.
go back to reference Hong, H. S., & Sun, Z. X. (2016). An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing. Journal of Cloud Computing, 5(2), 1–8. Hong, H. S., & Sun, Z. X. (2016). An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing. Journal of Cloud Computing, 5(2), 1–8.
27.
go back to reference Yao, X.X., Chen, Z., & Ye, T. (2015). A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems. 49, 104–112.CrossRef Yao, X.X., Chen, Z., & Ye, T. (2015). A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems. 49, 104–112.CrossRef
28.
go back to reference Hong, H. S., Sun, Z. X., & Liu, X. M. (2016). A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud. KSII Transactions on Internet and Information Systems, 10(5), 2394–2406. Hong, H. S., Sun, Z. X., & Liu, X. M. (2016). A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud. KSII Transactions on Internet and Information Systems, 10(5), 2394–2406.
Metadata
Title
A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks
Authors
Hanshu Hong
Zhixin Sun
Publication date
24-10-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3825-4

Other articles of this Issue 2/2017

Wireless Personal Communications 2/2017 Go to the issue