Attribute-based ring signcryption scheme

被引:17
作者
Guo, Zhenzhou [1 ]
Li, Mingchu [2 ]
Fan, Xinxin [2 ]
机构
[1] Shenyang Aerosp Univ, Sch Comp, Shenyang 110136, Peoples R China
[2] Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China
关键词
ring signcryption; attribute-based encryption; provable security; cryptography; ENCRYPTION; SIGNATURE;
D O I
10.1002/sec.614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present attribute-based ring signcryption scheme, which realizes the concept of ring signcryption in the attribute-based encryption frame firstly. In our system, it allows a user to signcrypt a message by a set of attributes that are chosen without revealing its identity. In additional, we propose the security models and prove the confidentiality and unforgeability of our schemes. We also present the efficiency of our scheme by comparisons. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:790 / 796
页数:7
相关论文
共 22 条
[1]  
[Anonymous], ID BASED RING SIGNAT
[2]  
Beak J, J CRYPTOLOGY, P203
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Bresson E, 2002, LECT NOTES COMPUT SC, V2442, P465
[5]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[6]  
Chen Y, 2006, P INT C WIRELESS COM, P189, DOI [10.1145/1143549.1143588, DOI 10.1145/1143549.1143588]
[7]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[8]  
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
[9]  
Herranz J, 2003, LECT NOTES COMPUT SC, V2904, P266
[10]  
Huang XY, 2005, AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, P649