Functional Signcryption

被引:2
|
作者
Datta, Pratish [1 ]
Dutta, Ratna [2 ]
Mukhopadhyay, Sourav [2 ]
机构
[1] NTT Corp, Secure Platform Labs, Tokyo 1808585, Japan
[2] IIT Kharagpur, Dept Math, Kharagpur 721302, W Bengal, India
关键词
Functional signcryption; Indistinguishability obfuscation; Statistically simulation-sound non-interactive zero-knowledge proof of knowledge; Polynomial-size circuits; ATTRIBUTE-BASED SIGNCRYPTION; PERSONAL HEALTH RECORDS; INDISTINGUISHABILITY OBFUSCATION; EFFICIENT SIGNCRYPTION; ENCRYPTION; PRIVACY; SECURE;
D O I
10.1016/j.jisa.2018.08.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Functional encryption (FE) allows to restrict decryption in a highly sophisticated fashion, whereas, functional signature (FS) enables to enforce arbitrarily complex control on signing capabilities. This paper introduces a new cryptographic primitive, termed as functional signcryption (FSC), which unifies the functionalities of FE and FS into a cost-effective formulation. FSC is a crucial step towards efficient implementation of modern digital communication and storage systems that demand advanced forms of confidentiality and authenticity simultaneously. Precisely, we make the following contributions: -First, we present a formal definition of FSC and carefully formulate its security requirements. -Next, we provide a generic construction of FSC supporting signing and decryption functionalities realizable by general polynomial size circuits, based on fundamental cryptographic tools, namely, indistinguishability obfuscation (IO) for circuits and statistically simulation-sound non-interactive zero-knowledge proof of knowledge (SSS-NIZKPoK). -Finally, we exhibit a number of representative applications of this interesting cryptographic primitive: (i) We develop the first ever attribute-based signcryption (ABSC) scheme for arbitrary polynomial size circuits from FSC. (ii) We show how FSC can be utilized to build SSS-NIZKPoK systems and IO for general circuits. This result in conjunction with our FSC construction can be interpreted as establishing an equivalence between FSC and the other two important cryptographic primitives. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:118 / 134
页数:17
相关论文
共 50 条
  • [21] An Elliptic Curve Signcryption Scheme and Its Application
    Zhang, Ping
    Li, Yamin
    Chi, Huanhuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [22] Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable
    Obiri, Isaac Amankona
    Xia, Qi
    Xia, Hu
    Affum, Eric
    Abla, Smahi
    Gao, Jianbin
    JOURNAL OF COMPUTER SECURITY, 2022, 30 (02) : 291 - 324
  • [23] A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things
    Shaw, Surbhi
    Dutta, Ratna
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76
  • [24] Design of CSKAS-VANET model for stable clustering and authentication scheme using RBMA and signcryption
    Gayathri, M.
    Gomathy, C.
    FRONTIERS IN COMPUTER SCIENCE, 2024, 6
  • [25] Secure outsourced attribute-based signcryption for cloud-based Internet of Vehicles in a smart city
    Hundera, Negalign Wake
    Jin, Chuanjie
    Aftab, Muhammad Umar
    Mesfin, Dagmawit
    Kumar, Sachin
    ANNALS OF TELECOMMUNICATIONS, 2021, 76 (9-10) : 605 - 616
  • [26] Certificateless Proxy Signcryption in the Standard Model for a UAV Network
    Qu, Yunyun
    Zeng, Jiwen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) : 15116 - 15127
  • [27] Attribute-based signcryption with hybrid access policy
    Yu, Gang
    Cao, Zhenfu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 253 - 261
  • [28] Unlinkable Signcryption Scheme for Multi-Receiver in VANETs
    Liang, Yangfan
    Yan, Hongyang
    Liu, Yining
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (09) : 10138 - 10154
  • [29] An efficient signcryption scheme with key privacy and its extension to ring signcryption
    Li, Chung
    Yang, Guomin
    Wong, Duncan
    Deng, Xiaotie
    Chow, Sherman
    JOURNAL OF COMPUTER SECURITY, 2010, 18 (03) : 451 - 473
  • [30] Efficient identity-based broadcast signcryption schemes
    Kim, Intae
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 914 - 925