Threshold attribute-based signcryption and its application to authenticated key agreement

被引:7
|
作者
Zheng, Haibin [1 ]
Qin, Jing [1 ]
Hu, Jiankun [2 ]
Wu, Qianhong [3 ]
机构
[1] Shandong Univ, Sch Math, Jinan, Peoples R China
[2] Univ New South Wales, Sch Engn & IT, Sydney, NSW, Australia
[3] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
关键词
signcryption; attribute-based signcryption; standard model; threshold cryptosystem; key agreement;
D O I
10.1002/sec.1664
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signcryption is a public key cryptosystem that achieves the functions of digital signature and public key encryption simultaneously. It significantly reduces the cost of traditional signature-then-encryption approach. Although a large body of signcryption schemes have been proposed, few works have been done on attribute-based signcryption (ABSC), which simultaneously achieves the functionalities of attribute-based encryption and attribute-based signature, two important cryptographic primitives proposed to enforce fine-grained access control and user authentication in cloud computing applications. In this paper, we present a threshold ABSC scheme. The scheme is proven secure under the well-established Decisional Bilinear Diffie-Hellman and the standard Computational Diffie-Hellman assumptions in the standard model. Compared with the state of the ABSC art, our scheme has comparable efficiency without relying on any random oracle. Furthermore, we construct an authenticated key agreement protocol based on this threshold attribute-based signcryption from the point of improving the security of cloud computing. (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4914 / 4923
页数:10
相关论文
共 50 条
  • [31] An Authenticated Key Agreement Protocol for Cross-Domain Based on Heterogeneous Signcryption Scheme
    Wang, Caifen
    Liu, Chao
    Niu, Shufen
    Chen, Li
    Wang, Xu
    [J]. 2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 723 - 728
  • [32] Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography
    Wang, Zhen
    Ma, Zhaofeng
    Luo, Shoushan
    Gao, Hongmin
    [J]. IEEE ACCESS, 2019, 7 : 149080 - 149096
  • [33] Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange
    Yoneyama, Kazuki
    [J]. PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 147 - 166
  • [34] Authenticated Asymmetric Group Key Agreement Protocol and Its Application
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [35] Revocable attribute-based key agreement protocol without random oracles
    Wang, Hao
    Xu, Qiu-Liang
    Fu, Xiu
    [J]. Journal of Networks, 2009, 4 (08) : 787 - 794
  • [36] Design of Attribute Based Authenticated Group Key Agreement Protocol Without Pairing
    Verma, Reshu
    Kumar, Abhimanyu
    [J]. 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 95 - 104
  • [37] Attribute-Based Signcryption From Lattices in the Standard Model
    Yan, Jianhua
    Wang, Licheng
    Li, Muzi
    Ahmad, Haseeb
    Yue, Jun
    Yao, Wenbin
    [J]. IEEE ACCESS, 2019, 7 : 56039 - 56050
  • [38] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION
    Shao, Shuai
    Tian, Bin
    Wang, Xin
    Li, Yang
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244
  • [39] Revocable Threshold Attribute-Based Signature against Signing Key Exposure
    Wei, Jianghong
    Huang, Xinyi
    Hu, Xuexian
    Liu, Wenfen
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 316 - 330
  • [40] Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
    Shahandashti, Siamak F.
    Safavi-Naini, Reihaneh
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 198 - +