A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks

被引:3
|
作者
Hong, Hanshu [1 ]
Sun, Zhixin [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Key Lab Broadband Wireless Commun & Sensor Networ, Minist Educ, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute based; Signcryption; Key insulated; High efficiency; SCHEME; IMPROVEMENT; ENCRYPTION; SECURITY;
D O I
10.1007/s11277-016-3825-4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Attribute based signcryption (ABSC) combines the merits of ABE and ABS, which can provide both confidentiality and authentication in a single step. In this paper, we present a key insulated ciphertext policy attribute based signcryption scheme (KI-CP-ABSC) for data protection in wireless networks. In our scheme, a target access structure is embedded into ciphertexts, while user's private key corresponds an attribute set. Only the two are matched can a receiver decrypt the ciphertexts and verify whether it is from valid data signer. We introduce key insulation mechanism into our scheme by dividing the system lifetime into several time periods. When key exposure happens, the system will evolve into the next time period to preserve the forward security. We eliminate bilinear parings in our KI-CP-ABSC thus the computation burden on the terminal devices are reduced sharply. The high efficiency and proved security make our KI-CP-ABSC a promising tool for secure data sharing in wireless environments.
引用
收藏
页码:1215 / 1228
页数:14
相关论文
共 50 条
  • [1] A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks
    Hanshu Hong
    Zhixin Sun
    Wireless Personal Communications, 2017, 95 : 1215 - 1228
  • [2] Attribute-based key-insulated signcryption with bidirectional anonymity
    Zhang, Xing-Lan
    Zhang, Zhen
    Tongxin Xuebao/Journal on Communications, 2013, 34 (11): : 42 - 50
  • [3] Key-Insulated Signcryption
    Fan, Jia
    Zheng, Yuliang
    Tang, Xiaohu
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (10) : 1351 - 1374
  • [4] Identity-Based Key-Insulated Signcryption
    Chen, Jianhong
    Chen, Kefei
    Wang, Yongtao
    Li, Xiangxue
    Long, Yu
    Wan, Zhongmei
    INFORMATICA, 2012, 23 (01) : 27 - 45
  • [5] Identity-based key-insulated signcryption scheme
    Wang, Huige
    Cao, Hao
    Li, Desheng
    Journal of Computational Information Systems, 2013, 9 (08): : 3067 - 3075
  • [6] An Improvement of an Identity-Based Key-insulated Signcryption
    Zhu, Guobin
    Xiong, Hu
    Wang, Ruijin
    Qin, Zhiguang
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 97 - 104
  • [7] Signature-policy attribute-based key-insulated signature
    Rao, Y. Sreenivasa
    IET INFORMATION SECURITY, 2017, 11 (01) : 23 - 33
  • [8] A ciphertext policy attribute based signcryption scheme with secure and flexible key evolving
    Hong, Hanshu
    Zhou, Xiaokang
    Hu, Bing
    Sun, Zhixin
    2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 413 - 418
  • [9] Attribute-Based Key-Insulated Encryption
    Chen, Jian-Hong
    Wang, Yong-Tao
    Chen, Ke-Fei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (02) : 437 - 449
  • [10] Attribute Based Key-Insulated Signatures with Message Recovery
    Rao, Y. Sreenivasa
    Dutta, Ratna
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 215 - 229