A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks

被引:3
作者
Hong, Hanshu [1 ]
Sun, Zhixin [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Key Lab Broadband Wireless Commun & Sensor Networ, Minist Educ, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute based; Signcryption; Key insulated; High efficiency; SCHEME; IMPROVEMENT; ENCRYPTION; SECURITY;
D O I
10.1007/s11277-016-3825-4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Attribute based signcryption (ABSC) combines the merits of ABE and ABS, which can provide both confidentiality and authentication in a single step. In this paper, we present a key insulated ciphertext policy attribute based signcryption scheme (KI-CP-ABSC) for data protection in wireless networks. In our scheme, a target access structure is embedded into ciphertexts, while user's private key corresponds an attribute set. Only the two are matched can a receiver decrypt the ciphertexts and verify whether it is from valid data signer. We introduce key insulation mechanism into our scheme by dividing the system lifetime into several time periods. When key exposure happens, the system will evolve into the next time period to preserve the forward security. We eliminate bilinear parings in our KI-CP-ABSC thus the computation burden on the terminal devices are reduced sharply. The high efficiency and proved security make our KI-CP-ABSC a promising tool for secure data sharing in wireless environments.
引用
收藏
页码:1215 / 1228
页数:14
相关论文
共 26 条
[11]   Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme [J].
Hu, Chunqiang ;
Zhang, Nan ;
Li, Hongjuan ;
Cheng, Xiuzhen ;
Liao, Xiaofeng .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :37-46
[12]   Improving Security and Efficiency in Attribute-Based Data Sharing [J].
Hur, Junbeom .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (10) :2271-2282
[13]   Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption [J].
Lewko, Allison ;
Okamoto, Tatsuaki ;
Sahai, Amit ;
Takashima, Katsuyuki ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 :62-+
[14]   Certificateless hybrid signcryption [J].
Li, Fagen ;
Shirase, Masaaki ;
Takagi, Tsuyoshi .
MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (3-4) :324-343
[15]   Certificateless signcryption scheme in the standard model [J].
Liu, Zhenhua ;
Hu, Yupu ;
Zhang, Xiangsong ;
Ma, Hua .
INFORMATION SCIENCES, 2010, 180 (03) :452-464
[16]  
Maji Hemanta K., 2011, Topics in Cryptology - CT-RSA 2011. The Cryptographers' Track at the RSA Conference 2011, P376, DOI 10.1007/978-3-642-19074-2_24
[17]   An Attribute-Based Signcryption Scheme and Its Application in Information Hiding [J].
Peng Changgen ;
Wang Weiru ;
Tian Youliang ;
Yuan Zhilong .
CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (04) :632-640
[18]   Fuzzy identity-based encryption [J].
Sahai, A ;
Waters, B .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :457-473
[19]   Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing [J].
Shi, Wenbo ;
Kumar, Neeraj ;
Gong, Peng ;
Zhang, Zezhong .
FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (04) :656-666
[20]   Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization [J].
Waters, Brent .
PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 :53-70