Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model

被引:0
作者
Rao, Y. Sreenivasa [1 ]
Dutta, Ratna [1 ]
机构
[1] Indian Inst Technol, Kharagpur 721302, W Bengal, India
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2014 | 2014年 / 8544卷
关键词
attribute based signature; signcryption; public ciphertext verifiability; signer privacy; LSSS-realizable access structure; ENCRYPTION; SECURITY;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper proposes an efficient key-policy attribute based signature (ABS) scheme with constant-size signature for expressive linear secret-sharing scheme (LSSS)-realizable monotone access structures with only 3 pairings for the verification algorithm, which is an affirmative answer for one of the open problems left in Pairing 2012 by Gagne et al. Our ABS provides signer privacy, and the existential unforgeability is achieved in selective security model. We also propose a new attribute based signcryption (ABSC) scheme for LSSS-realizable access structures utilizing only 6 pairings and making the ciphertext size constant. Our scheme is significantly more efficient than existing ABSC schemes. While the secret key size increases by a factor of number of attributes used in the system, the number of pairing evaluations is reduced to constant. Our protocol achieves (a) ciphertext indistinguishability under adaptive chosen ciphertext attacks assuming the hardness of decisional Bilinear Diffie-Hellman Exponent problem, (b) existential unforgeability under adaptive chosen message attack assuming the hardness of computational Diffie-Hellman Exponent problem and (c) strong unforgeability against insider adversary. The security proofs are in selective security model without using any random oracle. In addition, our ABSC achieves public verifiability of the ciphertext, enabling any party to verify the integrity and validity of the ciphertext.
引用
收藏
页码:209 / 225
页数:17
相关论文
共 25 条
[1]  
[Anonymous], LNCS
[2]  
[Anonymous], 2010351 CRYPT EPRINT
[3]   Attribute-based encryption schemes with constant-size ciphertexts [J].
Attrapadung, Nuttapong ;
Herranz, Javier ;
Laguillaumie, Fabien ;
Libert, Benoit ;
de Panafieu, Elie ;
Rafols, Carla .
THEORETICAL COMPUTER SCIENCE, 2012, 422 :15-38
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Changji Wang, 2011, Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security (CIS 2011), P905, DOI 10.1109/CIS.2011.204
[6]  
Cheng Chen, 2013, Topics in Cryptology - CT-RSA 2013. The Cryptographers Track at the RSA Conference 2013. Proceedings, P50, DOI 10.1007/978-3-642-36095-4_4
[7]  
Emura K., INT J APPL CRYPTOGRA, V2, P199
[8]  
Gagné M, 2010, LECT NOTES COMPUT SC, V6280, P154, DOI 10.1007/978-3-642-15317-4_11
[9]  
Ge A., 2012, IET INFORM SECUR, V6, P1
[10]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1