Threshold Attribute-Based Signcryption

被引:0
|
作者
Gagne, Martin [1 ]
Narayan, Shivaramakrishnan [1 ]
Safavi-Naini, Reihaneh [1 ]
机构
[1] Univ Calgary, Dept Comp Sci, Calgary, AB T2N 1N4, Canada
来源
关键词
ENCRYPTION; EFFICIENT; SIGNATURES; BROADCAST;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we propose a new threshold attribute-based signcryption scheme secure in the standard model. The scheme provides message confidentiality, and authenticity of a message in addition to attesting the attributes of the sender. Such a property is useful in applications such as electronic card, digital prescription carrier devices, secure and authentic email service, etc. Our scheme relies on the intractability of the hashed modified decisional Diffie-Hellman and modified computational Diffie-Hellman assumptions, and is proven secure under adaptive chosen ciphertext attack and chosen message attack security notions of signcryption. Further, we achieve a tight reduction for both the security notions in the standard model.
引用
收藏
页码:154 / 171
页数:18
相关论文
共 50 条
  • [1] Threshold Attribute-Based Signcryption in Standard Model
    Zheng, Haibin
    Qin, Jing
    Hu, Jiankun
    Wu, Qianhong
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 187 - 193
  • [2] A traceable threshold attribute-based signcryption for mHealthcare social network
    Lu, Yanfei
    Wang, Xu
    Hu, Chunqiang
    Li, Hui
    Huo, Yan
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2018, 26 (01) : 43 - 53
  • [3] Traceable attribute-based signcryption
    Wei, Jianghong
    Hu, Xuexian
    Liu, Wenfen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2302 - 2317
  • [4] Threshold attribute-based signcryption and its application to authenticated key agreement
    Zheng, Haibin
    Qin, Jing
    Hu, Jiankun
    Wu, Qianhong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 4914 - 4923
  • [5] Attribute-based ring signcryption scheme
    Guo, Zhenzhou
    Li, Mingchu
    Fan, Xinxin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (06) : 790 - 796
  • [6] Toward Dynamic Attribute-Based Signcryption
    Emura, Keita
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    [J]. INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 439 - +
  • [7] Threshold Attribute-based Signcryption with Constant-Size Ciphertexts and Public Verifiability
    Han Yiliang
    Lu Wanyi
    Yang Xiaoyuan
    [J]. 2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, : 6373 - 6377
  • [8] OUTSOURCED ATTRIBUTE-BASED SIGNCRYPTION IN THE CLOUD COMPUTING
    Negalign, Hundera W.
    Xiong, Hu
    Addis, Assefa A.
    Ashenafi, Gemechu Y.
    Dagmawit, Geresu M.
    [J]. 2018 15TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2018, : 40 - 44
  • [9] Cryptanalysis of attribute-based ring signcryption scheme
    Xiong, Hu
    Geng, Ji
    Qin, Zhiguang
    Zhu, Guobin
    [J]. International Journal of Network Security, 2015, 17 (02) : 224 - 228
  • [10] Attribute-based signcryption with hybrid access policy
    Gang Yu
    Zhenfu Cao
    [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 253 - 261