Threshold attribute-based signcryption and its application to authenticated key agreement

被引:7
|
作者
Zheng, Haibin [1 ]
Qin, Jing [1 ]
Hu, Jiankun [2 ]
Wu, Qianhong [3 ]
机构
[1] Shandong Univ, Sch Math, Jinan, Peoples R China
[2] Univ New South Wales, Sch Engn & IT, Sydney, NSW, Australia
[3] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
关键词
signcryption; attribute-based signcryption; standard model; threshold cryptosystem; key agreement;
D O I
10.1002/sec.1664
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signcryption is a public key cryptosystem that achieves the functions of digital signature and public key encryption simultaneously. It significantly reduces the cost of traditional signature-then-encryption approach. Although a large body of signcryption schemes have been proposed, few works have been done on attribute-based signcryption (ABSC), which simultaneously achieves the functionalities of attribute-based encryption and attribute-based signature, two important cryptographic primitives proposed to enforce fine-grained access control and user authentication in cloud computing applications. In this paper, we present a threshold ABSC scheme. The scheme is proven secure under the well-established Decisional Bilinear Diffie-Hellman and the standard Computational Diffie-Hellman assumptions in the standard model. Compared with the state of the ABSC art, our scheme has comparable efficiency without relying on any random oracle. Furthermore, we construct an authenticated key agreement protocol based on this threshold attribute-based signcryption from the point of improving the security of cloud computing. (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4914 / 4923
页数:10
相关论文
共 50 条
  • [1] Threshold Attribute-Based Signcryption
    Gagne, Martin
    Narayan, Shivaramakrishnan
    Safavi-Naini, Reihaneh
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 154 - 171
  • [2] Attribute-based authenticated key agreement protocol supporting revocation
    [J]. Li, Q., 1600, Editorial Board of Journal on Communications (35):
  • [3] Attribute-based authenticated key agreement protocol secure in ABeCK model
    Gao, Hai-Ying
    [J]. Ruan Jian Xue Bao/Journal of Software, 2015, 26 (12): : 3183 - 3195
  • [4] Attribute-Based Authenticated Key Exchange
    Gorantla, M. Choudary
    Boyd, Colin
    Nieto, Juan Manuel Gonzalez
    [J]. INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 300 - 317
  • [5] Threshold Attribute-Based Signcryption in Standard Model
    Zheng, Haibin
    Qin, Jing
    Hu, Jiankun
    Wu, Qianhong
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 187 - 193
  • [6] A Pairing Free Attribute-Based Authenticated Key Agreement Protocol Using ECC
    Verma, Reshu
    Kumar, Abhimanyu
    [J]. 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 105 - 114
  • [7] An Attribute-Based Signcryption Scheme and Its Application in Information Hiding
    PENG Changgen
    WANG Weiru
    TIAN Youliang
    YUAN Zhilong
    [J]. Chinese Journal of Electronics, 2016, 25 (04) : 632 - 640
  • [8] An Attribute-Based Signcryption Scheme and Its Application in Information Hiding
    Peng Changgen
    Wang Weiru
    Tian Youliang
    Yuan Zhilong
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (04) : 632 - 640
  • [9] A traceable threshold attribute-based signcryption for mHealthcare social network
    Lu, Yanfei
    Wang, Xu
    Hu, Chunqiang
    Li, Hui
    Huo, Yan
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2018, 26 (01) : 43 - 53
  • [10] An Efficient Attribute-Based Authenticated Key Exchange Protocol
    Chakraborty, Suvradip
    Rao, Y. Sreenivasa
    Rangan, Chandrasekaran Pandu
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 493 - 503