Threshold attribute-based signcryption and its application to authenticated key agreement

被引:7
|
作者
Zheng, Haibin [1 ]
Qin, Jing [1 ]
Hu, Jiankun [2 ]
Wu, Qianhong [3 ]
机构
[1] Shandong Univ, Sch Math, Jinan, Peoples R China
[2] Univ New South Wales, Sch Engn & IT, Sydney, NSW, Australia
[3] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
关键词
signcryption; attribute-based signcryption; standard model; threshold cryptosystem; key agreement;
D O I
10.1002/sec.1664
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signcryption is a public key cryptosystem that achieves the functions of digital signature and public key encryption simultaneously. It significantly reduces the cost of traditional signature-then-encryption approach. Although a large body of signcryption schemes have been proposed, few works have been done on attribute-based signcryption (ABSC), which simultaneously achieves the functionalities of attribute-based encryption and attribute-based signature, two important cryptographic primitives proposed to enforce fine-grained access control and user authentication in cloud computing applications. In this paper, we present a threshold ABSC scheme. The scheme is proven secure under the well-established Decisional Bilinear Diffie-Hellman and the standard Computational Diffie-Hellman assumptions in the standard model. Compared with the state of the ABSC art, our scheme has comparable efficiency without relying on any random oracle. Furthermore, we construct an authenticated key agreement protocol based on this threshold attribute-based signcryption from the point of improving the security of cloud computing. (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4914 / 4923
页数:10
相关论文
共 50 条
  • [41] An Identity and Attribute-based Key Agreement Scheme for Wireless Sensor and Actor Networks
    Fu, Xiaojing
    Zhang, Guoyin
    Ma, Chunguang
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [42] Two-Party Attribute-based Key Agreement Protocol in the Standard Model
    Wang, Hao
    Xu, QiuLiang
    Fu, Xiu
    [J]. ISIP: 2009 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING, PROCEEDINGS, 2009, : 325 - 328
  • [43] Attribute-based Authenticated Protocol for Secure Communication of VANET
    Han Yiliang
    Lin Xi
    Jiang Di
    Fang Dingyi
    [J]. 2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 4078 - 4081
  • [44] A Novel Attribute-Based Signcryption Scheme In Cloud Computing Environments
    Meng, Xianyong
    Meng, Xiangyu
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION (ICIA), 2016, : 1976 - 1979
  • [45] A Privacy-Preserving Attribute-Based Authenticated Key Management Scheme for Accountable Vehicular Communications
    Tan, Haowen
    Zheng, Wenying
    Guan, Yunguo
    Lu, Rongxing
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (03) : 3622 - 3635
  • [46] Attribute-Based Authenticated Group Key Management Protocol for Mobile Peer-to-Peer Network
    Zhang Guoyin
    Fu Xiaojing
    Ma Chunguang
    [J]. CHINA COMMUNICATIONS, 2012, 9 (10) : 68 - 77
  • [47] Attribute-based key-insulated signature and its applications
    Chen, Jianhong
    Long, Yu
    Chen, Kefei
    Guo, Jie
    [J]. INFORMATION SCIENCES, 2014, 275 : 57 - 67
  • [48] Privacy-Preserving Decentralized Key-Policy Attribute-Based Signcryption in Cloud Computing Environments
    Meng Xian Yong
    Chen Zhong
    Meng Xiang Yu
    [J]. SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS II, PTS 1 AND 2, 2014, 475-476 : 1144 - +
  • [49] Hierarchical and non-monotonic key-policy attribute-based encryption and its application
    Li, Cong
    Shen, Qingni
    Xie, Zhikang
    Dong, Jisheng
    Feng, Xinyu
    Fang, Yuejian
    Wu, Zhonghai
    [J]. INFORMATION SCIENCES, 2022, 611 : 591 - 627
  • [50] Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols based on Two Hard Problems
    Do Viet Binh
    Nguyen Hieu Minh
    Nguyen Nam Hai
    Hur, Junbeom
    Dang Hoang Minh
    Ho Sy Tan
    [J]. PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2017, : 16 - 22