A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks

被引:3
作者
Hong, Hanshu [1 ]
Sun, Zhixin [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Key Lab Broadband Wireless Commun & Sensor Networ, Minist Educ, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute based; Signcryption; Key insulated; High efficiency; SCHEME; IMPROVEMENT; ENCRYPTION; SECURITY;
D O I
10.1007/s11277-016-3825-4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Attribute based signcryption (ABSC) combines the merits of ABE and ABS, which can provide both confidentiality and authentication in a single step. In this paper, we present a key insulated ciphertext policy attribute based signcryption scheme (KI-CP-ABSC) for data protection in wireless networks. In our scheme, a target access structure is embedded into ciphertexts, while user's private key corresponds an attribute set. Only the two are matched can a receiver decrypt the ciphertexts and verify whether it is from valid data signer. We introduce key insulation mechanism into our scheme by dividing the system lifetime into several time periods. When key exposure happens, the system will evolve into the next time period to preserve the forward security. We eliminate bilinear parings in our KI-CP-ABSC thus the computation burden on the terminal devices are reduced sharply. The high efficiency and proved security make our KI-CP-ABSC a promising tool for secure data sharing in wireless environments.
引用
收藏
页码:1215 / 1228
页数:14
相关论文
共 26 条
[1]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[2]  
Changji Wang, 2011, Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security (CIS 2011), P905, DOI 10.1109/CIS.2011.204
[3]  
Chen JH, 2012, INFORMATICA-LITHUAN, V23, P27
[4]  
Dodis Y., 2002, IACR EPRINT ARCH
[5]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[6]  
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
[7]   Attribute-based signature scheme [J].
Guo Shaniqng ;
Zeng Yingpei .
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, :509-+
[8]   A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud [J].
Hong, Hanshu ;
Sun, Zhixin ;
Liu, Ximeng .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (05) :2394-2406
[9]   High efficient key-insulated attribute based encryption scheme without bilinear pairing operations [J].
Hong, Hanshu ;
Sun, Zhixin .
SPRINGERPLUS, 2016, 5 :1-12
[10]  
Hu C. Q., 2016, LECT NTOES I COMPUTE, V164, P418