Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2017

20-11-2015

Attribute-based signcryption with hybrid access policy

Authors: Gang Yu, Zhenfu Cao

Published in: Peer-to-Peer Networking and Applications | Issue 1/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Attribute-based signcryption (ABSC) can fulfill the functionality of attribute-based signature (ABS) and attribute-based encryption (ABE) in a logical step. Depending on whether the access policy is embedded in the keys or ciphertexts, ABS and ABE are generally divided into two types: key policy and ciphertext policy. In this paper, we propose an ABSC scheme supporting key policy signature and ciphertext policy encryption, called KCP-ABSC, which is the first ABSC scheme with hybrid access policy to our known. The proposed KCP-ABSC scheme is proven to be ciphertext indistinguishability under chosen ciphertext attacks and achieves existential unforgeability under chosen message attack in the standard model. Furthermore, the size of the ciphertext in the new KCP-ABSC scheme is constant, i.e., independent of the number of attributes used in the system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sahai A, Waters B (2005) Fuzzy identity based encryption [A]. In: Advances in Cryptology—EUROCRYPT 2005, LNCS 3494[C]. Springer-Verlag, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity based encryption [A]. In: Advances in Cryptology—EUROCRYPT 2005, LNCS 3494[C]. Springer-Verlag, pp 457–473
2.
go back to reference Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data[A]. In: Proceedings of ACM Conference on Computer and Communication Security—CCS 2006[C]. ACM Press, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data[A]. In: Proceedings of ACM Conference on Computer and Communication Security—CCS 2006[C]. ACM Press, pp 89–98
3.
go back to reference Cheung L, Newport C (2007) Provably secure ciphertext-policy ABE [A]. In: Proceedings of ACM Conference on Computer and Communication Security—CCS 2007[C]. ACM Press, pp 456–465 Cheung L, Newport C (2007) Provably secure ciphertext-policy ABE [A]. In: Proceedings of ACM Conference on Computer and Communication Security—CCS 2007[C]. ACM Press, pp 456–465
4.
go back to reference Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[A]. In: Advances in Cryptology—EUROCRYPT 2010, LNCS 6110[C]. Springer-Verlag, pp 62–91 Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[A]. In: Advances in Cryptology—EUROCRYPT 2010, LNCS 6110[C]. Springer-Verlag, pp 62–91
5.
go back to reference Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization[M], Public Key Cryptography–PKC 2011. Springer, Berlin Heidelberg, pp 53–70MATH Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization[M], Public Key Cryptography–PKC 2011. Springer, Berlin Heidelberg, pp 53–70MATH
6.
go back to reference Lewko A, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques[A]. In: Advances in Cryptology—CRYPTO 2012, LNCS 7417[C]. Springer-Verlag, pp 180–198 Lewko A, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques[A]. In: Advances in Cryptology—CRYPTO 2012, LNCS 7417[C]. Springer-Verlag, pp 180–198
7.
go back to reference Ge A, Zhang R, Chen C, Ma C, Zhang Z (2012) Threshold ciphertext-policy attribute-based encryption with constant-size ciphertexts[A]. In: Proceedings of Australasian Conference on Information Security and Privacy—ACISP 2012, LNCS 7372[C]. Springer-Verlag, pp 336–349 Ge A, Zhang R, Chen C, Ma C, Zhang Z (2012) Threshold ciphertext-policy attribute-based encryption with constant-size ciphertexts[A]. In: Proceedings of Australasian Conference on Information Security and Privacy—ACISP 2012, LNCS 7372[C]. Springer-Verlag, pp 336–349
8.
go back to reference Garg S, Gentry C, Halevi S et al (2013) Attribute-based encryption for circuits from multilinear maps[M], advances in Cryptology–CRYPTO 2013. Springer, Berlin Heidelberg, pp 479–499MATH Garg S, Gentry C, Halevi S et al (2013) Attribute-based encryption for circuits from multilinear maps[M], advances in Cryptology–CRYPTO 2013. Springer, Berlin Heidelberg, pp 479–499MATH
9.
go back to reference Hohenberger S, Waters B (2014) Online/offline attribute-based encryption[M], Public-Key Cryptography–PKC 2014. Springer, Berlin Heidelberg, pp 293–310CrossRefMATH Hohenberger S, Waters B (2014) Online/offline attribute-based encryption[M], Public-Key Cryptography–PKC 2014. Springer, Berlin Heidelberg, pp 293–310CrossRefMATH
10.
go back to reference Horváth M (2015) Attribute-based encryption optimized for cloud computing[M], SOFSEM: theory and practice of computer science. Springer, Berlin Heidelberg, pp 566–577MATH Horváth M (2015) Attribute-based encryption optimized for cloud computing[M], SOFSEM: theory and practice of computer science. Springer, Berlin Heidelberg, pp 566–577MATH
11.
go back to reference Qin B, Deng H, Wu Q et al (2015) Flexible attribute-based encryption applicable to secure e-healthcare records[J]. Int J Inf Secur 1–13 Qin B, Deng H, Wu Q et al (2015) Flexible attribute-based encryption applicable to secure e-healthcare records[J]. Int J Inf Secur 1–13
13.
go back to reference Shahandashti S, Safavi-Naini R (2009) Threshold attribute-based signatures and their application to anonymous credential systems[A]. In: Advances in Cryptology—AFRICACRYPT 2009, LNCS 5580[C]. Springer-Verlag, pp 178–193 Shahandashti S, Safavi-Naini R (2009) Threshold attribute-based signatures and their application to anonymous credential systems[A]. In: Advances in Cryptology—AFRICACRYPT 2009, LNCS 5580[C]. Springer-Verlag, pp 178–193
15.
go back to reference Okamoto T, Takashima K (2011) Efficient attribute-based signatures for nonmonotone predicates in the standard model[A]. In: Proceedings of Public Key Cryptology—PKC 2011, LNCS 6571[C]. Springer-Verlag, pp 35–52 Okamoto T, Takashima K (2011) Efficient attribute-based signatures for nonmonotone predicates in the standard model[A]. In: Proceedings of Public Key Cryptology—PKC 2011, LNCS 6571[C]. Springer-Verlag, pp 35–52
16.
go back to reference Ge A, Ma C, Zhang Z (2012) Attribute-based signature with constant-size signature in the standard model[J]. IET Inf Secur 6(2):47–54CrossRef Ge A, Ma C, Zhang Z (2012) Attribute-based signature with constant-size signature in the standard model[J]. IET Inf Secur 6(2):47–54CrossRef
17.
go back to reference Herranz J, Laguillaumie F, Libert B, Rafols C (2012) Short attribute-based signatures for threshold predicates[A]. In: Proceedings of Topics in Cryptology—CT-RSA 2012, LNCS 7178[C]. Springer-Verlag, pp 51–67 Herranz J, Laguillaumie F, Libert B, Rafols C (2012) Short attribute-based signatures for threshold predicates[A]. In: Proceedings of Topics in Cryptology—CT-RSA 2012, LNCS 7178[C]. Springer-Verlag, pp 51–67
18.
go back to reference Okamoto T, Takashima K (2013) Decentralized attribute-based signature[A]. In: Proceedings of Public Key Cryptology—PKC 2013, LNCS 7778[C]. Springer-Verlag, pp 125–142 Okamoto T, Takashima K (2013) Decentralized attribute-based signature[A]. In: Proceedings of Public Key Cryptology—PKC 2013, LNCS 7778[C]. Springer-Verlag, pp 125–142
19.
go back to reference Sreenivasa Rao Y, Dutta R (2014) Expressive bandwidth-efficient attribute based signature and signcryption in standard model. Inf Secur Priv Lect Notes Comput Sci 8544:209–225CrossRefMATH Sreenivasa Rao Y, Dutta R (2014) Expressive bandwidth-efficient attribute based signature and signcryption in standard model. Inf Secur Priv Lect Notes Comput Sci 8544:209–225CrossRefMATH
20.
go back to reference Zheng YL (1997) Digital signcryption or how to achieve cost (signature & encryption ≤ cost (signature) + cost (encryption) [A]. In: Advances in Cryptology-Crypto’97 [C], LNCS 1294, Berlin: Springer-Verlag, pp 165–179 Zheng YL (1997) Digital signcryption or how to achieve cost (signature & encryption ≤ cost (signature) + cost (encryption) [A]. In: Advances in Cryptology-Crypto’97 [C], LNCS 1294, Berlin: Springer-Verlag, pp 165–179
21.
go back to reference Gagne M, Narayan S, Safavi-Naini R (2010) Threshold attribute-based signcryption[C]. Proceedings of the 7th International Conference on Security and Cryptography for Networks, Amalfi, Italy, Sep. 13–15, 2010, LNCS 6280, pp 154–171 Gagne M, Narayan S, Safavi-Naini R (2010) Threshold attribute-based signcryption[C]. Proceedings of the 7th International Conference on Security and Cryptography for Networks, Amalfi, Italy, Sep. 13–15, 2010, LNCS 6280, pp 154–171
22.
go back to reference Emura K, Miyaji A, Rahman MS (2011) Toward dynamic attribute-based signcryption(Poster)[C]. Proceedings of the 16th Australasian Conference on Information Security and Privacy, Melbourne, Australia, July 11–13, 2011, LNCS 6812, pp 439–443 Emura K, Miyaji A, Rahman MS (2011) Toward dynamic attribute-based signcryption(Poster)[C]. Proceedings of the 16th Australasian Conference on Information Security and Privacy, Melbourne, Australia, July 11–13, 2011, LNCS 6812, pp 439–443
23.
go back to reference Chen C, Chen J, Lim HW, Zhang Z, Feng D (2012) Combined public-key schemes:the case of ABE and ABS. In: Takagi T, Wang G, Qin Z, Jiang S, Yu Y (eds) ProvSec 2012. LNCS, vol 7496, pp 53–69 Chen C, Chen J, Lim HW, Zhang Z, Feng D (2012) Combined public-key schemes:the case of ABE and ABS. In: Takagi T, Wang G, Qin Z, Jiang S, Yu Y (eds) ProvSec 2012. LNCS, vol 7496, pp 53–69
24.
go back to reference Wang C-J, Huang J-S, Lin W-L, Lin H-T (2013) Security analysis of Gagne et al.’s threshold attribute-based signcryption scheme. Intelligent networking and collaborative systems, 5th International Conference on Intelligent Networking and Collaborative Systems, pp 103–108 Wang C-J, Huang J-S, Lin W-L, Lin H-T (2013) Security analysis of Gagne et al.’s threshold attribute-based signcryption scheme. Intelligent networking and collaborative systems, 5th International Conference on Intelligent Networking and Collaborative Systems, pp 103–108
25.
go back to reference Han Y, Lu W, Yang X (2013) Attribute-based signcryption scheme with non-monotonic access structure. Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on 9–11 Sept. 2013, pp 796–802 Han Y, Lu W, Yang X (2013) Attribute-based signcryption scheme with non-monotonic access structure. Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on 9–11 Sept. 2013, pp 796–802
26.
go back to reference Pandit T, Kumar Pandey S, Barua R (2014) Attribute-based signcryption : signer privacy, strong unforgeability and IND-CCA2 security in adaptive-predicates attack, provable security. Lect Notes Comput Sci 8782:274–290CrossRefMATHMathSciNet Pandit T, Kumar Pandey S, Barua R (2014) Attribute-based signcryption : signer privacy, strong unforgeability and IND-CCA2 security in adaptive-predicates attack, provable security. Lect Notes Comput Sci 8782:274–290CrossRefMATHMathSciNet
27.
go back to reference Sreenivasa Rao Y, Dutta R (2014) Expressive attribute based signcryption with constant-size ciphertext, progress in cryptology–AFRICACRYPT 2014. Lect Notes Comput Sci 8469:398–419CrossRefMATH Sreenivasa Rao Y, Dutta R (2014) Expressive attribute based signcryption with constant-size ciphertext, progress in cryptology–AFRICACRYPT 2014. Lect Notes Comput Sci 8469:398–419CrossRefMATH
28.
go back to reference Selvi SSD, Vivek SS, Vinayagamurthy D, Rangan CP (2012) ID based signcryption scheme in standard model. In: Takagi T, Wang G, Qin Z, Jiang S, Yu Y (eds) ProvSec 2012. LNCS 7496, pp 35–52 Selvi SSD, Vivek SS, Vinayagamurthy D, Rangan CP (2012) ID based signcryption scheme in standard model. In: Takagi T, Wang G, Qin Z, Jiang S, Yu Y (eds) ProvSec 2012. LNCS 7496, pp 35–52
29.
go back to reference Malone-Lee J (2005) A general construction for simultaneous signing and encrypting [M], cryptography and coding. Springer, Berlin Heidelberg, pp 116–135MATH Malone-Lee J (2005) A general construction for simultaneous signing and encrypting [M], cryptography and coding. Springer, Berlin Heidelberg, pp 116–135MATH
30.
go back to reference Zhang R (2007) Tweaking TBE/IBE to PKE transforms with chameleon hash functions[A]. In: Proceedings of Applied Cryptography Networks Security-ACNS 2007, LNCS 4521[C], Springer-Verlag, pp 323–339 Zhang R (2007) Tweaking TBE/IBE to PKE transforms with chameleon hash functions[A]. In: Proceedings of Applied Cryptography Networks Security-ACNS 2007, LNCS 4521[C], Springer-Verlag, pp 323–339
31.
go back to reference Lai J, Deng R, Liu S, Kou W (2010) Efficient CCA-secure PKE from identity-based techniques[A]. In: Proceedings of Topics in Cryptology—CT-RSA 2010, LNCS 5985[C], Springer-Verlag, pp 132–147 Lai J, Deng R, Liu S, Kou W (2010) Efficient CCA-secure PKE from identity-based techniques[A]. In: Proceedings of Topics in Cryptology—CT-RSA 2010, LNCS 5985[C], Springer-Verlag, pp 132–147
Metadata
Title
Attribute-based signcryption with hybrid access policy
Authors
Gang Yu
Zhenfu Cao
Publication date
20-11-2015
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2017
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-015-0423-2

Other articles of this Issue 1/2017

Peer-to-Peer Networking and Applications 1/2017 Go to the issue

Premium Partner