Attribute-Based Signcryption From Lattices in the Standard Model

被引:9
作者
Yan, Jianhua [1 ,2 ]
Wang, Licheng [2 ]
Li, Muzi [1 ]
Ahmad, Haseeb [3 ]
Yue, Jun [1 ]
Yao, Wenbin [2 ]
机构
[1] Ludong Univ, Sch Informat & Elect Engn, Yantai 264025, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Natl Text Univ, Dept Comp Sci, Faisalabad 37610, Pakistan
基金
国家重点研发计划;
关键词
Signcryption; lattice; standard model; attribute-based; fine-grained access control; FULLY HOMOMORPHIC ENCRYPTION; TRAPDOORS; SCHEME;
D O I
10.1109/ACCESS.2019.2900003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For realizing the fine-grained access control with non-interactive approach, and effectively guaranteeing the comprehensive security for information under the post-quantum environment, this paper proposes an attribute-based signcryption (ABSC) scheme based on the intractability of lattices. The proposed ABSC scheme is proved indistinguishable against the inner adaptive-chosen ciphertext attacks (IND-CCA2) and existentially unforgeable against inner chosen-message attacks (EUF-CMA), in the standard model. The theoretical analysis presents that the public key size and the computational cost of the signcryption operation are both reduced obviously, compared with the signature and then encryption mechanism. An efficient variant is also presented that significantly decreases the computational complexity of unsigncryption operation at the expense of an increase in the ciphertext size.
引用
收藏
页码:56039 / 56050
页数:12
相关论文
共 36 条
[21]   Leveled Fully Homomorphic Signatures from Standard Lattices [J].
Gorbunov, Sergey ;
Vaikuntanathan, Vinod ;
Wichs, Daniel .
STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2015, :469-477
[22]   Attribute-based ring signcryption scheme [J].
Guo, Zhenzhou ;
Li, Mingchu ;
Fan, Xinxin .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (06) :790-796
[23]   Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT [J].
Hong, Hanshu ;
Sun, Zhixin .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (03) :595-607
[24]   Achieving secure data access control and efficient key updating in mobile multimedia sensor networks [J].
Hong, Hanshu ;
Sun, Zhixin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (04) :4477-4490
[25]   Decentralizing Attribute-Based Encryption [J].
Lewko, Allison ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 :568-588
[26]   Efficient signcryption in the standard model [J].
Li, Fagen ;
Zhang, Mingwu ;
Takagi, Tsuyoshi .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (17) :1977-1989
[27]  
Maji Hemanta K., 2011, Topics in Cryptology - CT-RSA 2011. The Cryptographers' Track at the RSA Conference 2011, P376, DOI 10.1007/978-3-642-19074-2_24
[28]  
Micciancio D., 2002, KLUWER INT SER ENG C, DOI 10.1007/978-1-4615-0897-7
[29]  
Proos J, 2003, QUANTUM INF COMPUT, V3, P317
[30]   On Lattices, Learning with Errors, Random Linear Codes, and Cryptography [J].
Regev, Oded .
JOURNAL OF THE ACM, 2009, 56 (06)