Functional Signcryption

被引:2
|
作者
Datta, Pratish [1 ]
Dutta, Ratna [2 ]
Mukhopadhyay, Sourav [2 ]
机构
[1] NTT Corp, Secure Platform Labs, Tokyo 1808585, Japan
[2] IIT Kharagpur, Dept Math, Kharagpur 721302, W Bengal, India
关键词
Functional signcryption; Indistinguishability obfuscation; Statistically simulation-sound non-interactive zero-knowledge proof of knowledge; Polynomial-size circuits; ATTRIBUTE-BASED SIGNCRYPTION; PERSONAL HEALTH RECORDS; INDISTINGUISHABILITY OBFUSCATION; EFFICIENT SIGNCRYPTION; ENCRYPTION; PRIVACY; SECURE;
D O I
10.1016/j.jisa.2018.08.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Functional encryption (FE) allows to restrict decryption in a highly sophisticated fashion, whereas, functional signature (FS) enables to enforce arbitrarily complex control on signing capabilities. This paper introduces a new cryptographic primitive, termed as functional signcryption (FSC), which unifies the functionalities of FE and FS into a cost-effective formulation. FSC is a crucial step towards efficient implementation of modern digital communication and storage systems that demand advanced forms of confidentiality and authenticity simultaneously. Precisely, we make the following contributions: -First, we present a formal definition of FSC and carefully formulate its security requirements. -Next, we provide a generic construction of FSC supporting signing and decryption functionalities realizable by general polynomial size circuits, based on fundamental cryptographic tools, namely, indistinguishability obfuscation (IO) for circuits and statistically simulation-sound non-interactive zero-knowledge proof of knowledge (SSS-NIZKPoK). -Finally, we exhibit a number of representative applications of this interesting cryptographic primitive: (i) We develop the first ever attribute-based signcryption (ABSC) scheme for arbitrary polynomial size circuits from FSC. (ii) We show how FSC can be utilized to build SSS-NIZKPoK systems and IO for general circuits. This result in conjunction with our FSC construction can be interpreted as establishing an equivalence between FSC and the other two important cryptographic primitives. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:118 / 134
页数:17
相关论文
共 50 条
  • [11] Efficient Constructions of Signcryption Schemes and Signcryption Composability
    Matsuda, Takahiro
    Matsuura, Kanta
    Schuldt, Jacob C. N.
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 321 - 342
  • [12] Practical NTRU Signcryption in the Standard Model
    Yan, Jianhua
    Lu, Xiuhua
    Li, Muzi
    Wang, Licheng
    Zhou, Jingxian
    Yao, Wenbin
    ENTROPY, 2023, 25 (12)
  • [13] A Survey of Identity-based Signcryption
    Li, Fagen
    Khan, Muhammad Khurram
    IETE TECHNICAL REVIEW, 2011, 28 (03) : 265 - 272
  • [14] Identity-Based Transitive Signcryption
    Hou, Shuquan
    Huang, Xinyi
    Xu, Li
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 246 - 259
  • [15] Certificateless signcryption scheme in the standard model
    Liu, Zhenhua
    Hu, Yupu
    Zhang, Xiangsong
    Ma, Hua
    INFORMATION SCIENCES, 2010, 180 (03) : 452 - 464
  • [16] An Efficient Revocable Attribute-Based Signcryption Scheme With Outsourced Unsigncryption in Cloud Computing
    Deng, Ningzhi
    Deng, Shaojiang
    Hu, Chunqiang
    Lei, Kaiwen
    IEEE ACCESS, 2020, 8 : 42805 - 42815
  • [17] A Hybrid Signcryption Scheme with Leakage-resilience Resistant to Side-channel Attacks
    Tseng, Yuh-Min
    Ho, Ting-Chieh
    Huang, Sen-Shan
    Tsai, Tung-Tso
    2024 8TH INTERNATIONAL CONFERENCE ON IMAGING, SIGNAL PROCESSING AND COMMUNICATIONS, ICISPC 2024, 2024, : 148 - 155
  • [18] A Generic Construction of Identity-Based Signcryption
    Li, Fagen
    Xiong, Hu
    Liao, Yongjian
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 291 - 295
  • [19] Identity Based Generalized Proxy Signcryption Scheme
    Zhou, Cai-Xue
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (01): : 13 - 26
  • [20] Certificateless KEM and Hybrid Signcryption Schemes Revisited
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 294 - 307