Attribute based Generalized Signcryption for Online Social Network

被引:0
作者
Han Yiliang [1 ]
Lu Wanyi [2 ]
机构
[1] Engn Univ APF, Dept Elect Technol, Xian 710086, Peoples R China
[2] Command Coll APF, Tianjin 300350, Peoples R China
来源
2015 34TH CHINESE CONTROL CONFERENCE (CCC) | 2015年
关键词
online social network; attribute based encryption; generalized signcryption; signcryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online social network has brought varies and flexible secure demands. Attribute based generalized signcryption (ABGSC) could bring the combined or separate confidentiality and authentication adaptively, and eliminate the bottleneck of traditional public key encryption. We proposed an attribute based generalized signcryption with non-monotonic access structures, which can perform signcryption, encryption and signature adaptively. The non-monotonic access structure is used to realize the "OR", "AND", "NEG" and "Threshold" operations; the Inner Product is used to achieve constant cipher text. Under the encryption mode, the cipher text length is 2 vertical bar G vertical bar+n(m), under the signature mode it is 3 vertical bar G vertical bar+n(m), and under the signcryption mode is 5 vertical bar G vertical bar+n(m), so we can improve the efficiency greatly. Under the q-DBDHE assumption in the stand model, the scheme is proved confidential under the signcryption and encryption mode, and is proved unforgeable under the signcryption and signature mode.
引用
收藏
页码:6434 / 6439
页数:6
相关论文
共 16 条
  • [1] [Anonymous], 2011, 29150 ISOIEC
  • [2] Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
  • [3] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [4] Gagné M, 2010, LECT NOTES COMPUT SC, V6280, P154, DOI 10.1007/978-3-642-15317-4_11
  • [5] Attribute-based signature scheme with constant size signature in the standard model
    Ge, A-J
    Ma, C-G
    Zhang, Z-F
    [J]. IET INFORMATION SECURITY, 2012, 6 (02) : 47 - 54
  • [6] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [7] Han Y, 2006, CHINESE J COMPUTERS, V11, P2003
  • [8] Adaptive secure multicast in wireless networks
    Han, Yiliang
    Gui, Xiaolin
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2009, 22 (09) : 1213 - 1239
  • [9] Herranz J, 2012, LECT NOTES COMPUT SC, V7178, P51, DOI 10.1007/978-3-642-27954-6_4
  • [10] [冀会芳 Ji Huifang], 2011, [电子与信息学报, Journal of Electronics & Information Technology], V33, P1204