Computer Science ›› 2016, Vol. 43 ›› Issue (11): 221-225.doi: 10.11896/j.issn.1002-137X.2016.11.043

Previous Articles     Next Articles

Attribute-based Online/Offline Signcryption for Mobile Network

JIANG Di and HAN Yi-liang   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Signcryption combines the functionalities of signature and encryption and costs less than the traditional approach.Online/Offline techniques can improve the efficiency of the signature and encryption,and one motivating application for this technology is mobile network devices.The previous attribute-based signcryption scheme is not practical and efficient,on the basis of Li’s attribute-based signature,an efficient attribute-based online/offline signcryption scheme was proposed in this paper.This scheme is provable secure in the random oracle model and it satisfies indistinguishability against adaptive chosen ciphertext attack based on l-th decisional bilinear Diffie-Hellman inversion (l-DBDHI) assumption and satisfies existential unforgeability against adaptive chosen message attack based on the standard computational Diffie-Hellman(CDH) assumption.Although the size of ciphertext increases,the new scheme achieves confindentiality and authentication,which is more suitable for the practical applications.

Key words: Signcryption,Online/Offline techniques,Attribute-based cryptography,Provable security

[1] Zheng Y.Digital signcryption or How to Achieve Cost(Signa-ture Encryption)<=Cost(Signature)+Cost(Signature)+Cost(Encryption)[C]∥Proceeding of CRYPTO’97,LNCS 1294.Berlin:Springer-Verlag,1997:165-179
[2] Even S,Goldreich O,Micali S.Online/Offline digital signatures[C]∥Proc.CRYPTO 89,LNCS 2442,1989:263-277
[3] Chow S S M,Liu J K,Zhou J Y.Identity-based online/offline key encapsulation and encryption[C]∥Proc of ASIACCS’11.HongKong,China,2011:52-60
[4] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryptionfor fine-grained access control of encrypted data[C]∥Procee-dings of the 13th ACM Conference on Computer and Communications Security.Alexandria,VA,USA,2006:221-238
[5] Maji H K,Prabhakaren M,Rosulek M.Attribute-based signatures:achieving attribute-privacy and collusion- resistance[R].IACR Cryptology ePrint Archive,Report,2008/328,2008
[6] Maji H K,Prabhakaren M,Rosulek M.Attribute-based signatures[J].Lecture Notes in Computer Science,2011,8:376-392
[7] Hohenberger S,Waters B.Online/Offline attribute-based En-cryption[M]∥Public Key Cryptography.Buenos Aires:Sprin-ger,2014:293-310
[8] Gagne′ M,Narayan S,Safavi-Naini R.Threshold attribute-based signcryption [C]∥SCN 2010,LNCS 6280.2010:154-171
[9] Emura K,Atsuko M,Mohammad S.Dynamic attribute basedsigncryption without random oracles [J].International Journal of Applied Cryptography,2012,2(3):199-211
[10] Li J,Man H A.Attribute-based signature and its applications[C]∥Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security.Beijing,China,2010:60-69
[11] Zhang Guo-ying,Fu Xiao-jing,Ma Chun-guang.A Dynamic Thre-shold Attributes-based Signcryption Scheme[J].Journal of Electronics & Information Technology,2012,34(11):2680-2686(in Chinese) 张国印,付小晶,马春光.一个动态门限的基于属性签密方案[J].电子与信息学报,2012,34(11):2680-2686

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!