Threshold Attribute-based Signcryption with Constant-Size Ciphertexts and Public Verifiability

被引:0
作者
Han Yiliang [1 ]
Lu Wanyi [1 ]
Yang Xiaoyuan [1 ]
机构
[1] Engn Univ CAPF, Key Lab Networks & Informat Secur CAPF, Dept Elect Technol, Xian 710086, Peoples R China
来源
2013 32ND CHINESE CONTROL CONFERENCE (CCC) | 2013年
关键词
Attribute-based signcrypton; Threshold signcryption; Public verifiability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threshold attribute based signcryption provides the flexible access control policy, and achieves sender anonymity, confidentiality, unforgeability and collusion resilience. While, the existed schemes are inefficient for cipher text lengths are linear functions of the attributes number. The paper employ Inner-product encryption, presented the first scheme of threshold attribute based signcryption with constant-size ciphertexts. Secure analysis in the standard model shows that, the proposal achieves unforgeability against chosen-message attack and indistinguishability against chosen-plaintext attack, under chosen-attribute set. The constant-size ciphertexts of the proposal is 5 vertical bar G(1) vertical bar + vertical bar G(2) vertical bar, and has no relation with the attribute number. It reduces the communication overheads significantly. Additionally, the proposed scheme also could be verified publicly, which improves the security further more.
引用
收藏
页码:6373 / 6377
页数:5
相关论文
共 18 条
[1]  
Agrawal S., LECT NOTES COMPUTER, V7293, P280
[2]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[3]  
Attrapadung N, 2010, LECT NOTES COMPUT SC, V6056, P384
[4]   Sagittal plane articulation of the contralateral knee of subjects with posterior cruciate ligament deficiency: an observational study [J].
Chandrasekaran, Sivashankar ;
Scarvell, Jennifer M. ;
Buirski, Graham ;
Woods, Kevin R. ;
Smith, Paul N. .
JOURNAL OF ORTHOPAEDIC SURGERY AND RESEARCH, 2012, 7
[5]  
Chen C, 2011, LECT NOTES COMPUT SC, V6980, P84, DOI 10.1007/978-3-642-24316-5_8
[6]  
Cheng Chen, 2012, Provable Security. Proceedings of the 6th International Conference (ProvSec 2012), P53, DOI 10.1007/978-3-642-33272-2_5
[7]  
Emura Keita, 2012, International Journal of Applied Cryptography, V2, P199, DOI 10.1504/IJACT.2012.045589
[8]  
Gagné M, 2010, LECT NOTES COMPUT SC, V6280, P154, DOI 10.1007/978-3-642-15317-4_11
[9]  
Ge Aijun, 2012, Information Security and Privacy. Proceedings 17th Australasian Conference, ACISP 2012, P336, DOI 10.1007/978-3-642-31448-3_25
[10]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1