Abstract
In the driven of big data, social computing and information security is undergoing rapid development and beginning to cross. This paper describes a key-policy attribute-based signcryption scheme which has less computation costs than existing similar schemes by utilizing secure outsourcing of scientific computation in cloud computing and eliminates overhead for users, the ciphertext is short, compact, the correctness of transformation algorithm is verifiable. The decrease of ciphertext is 17 %. Additionally, new scheme remits the key escrow problem and is proven selective security in the standard model, it could be verified publicly, applied in mobile devices.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
The setting of parameter references the Elliptic Curve Public Cryptography.
- 2.
We set N = 2, in real life applications, N is far greater than 2, here, we choose the minimum.
References
Nepal, S., Bouguettaya, A., Paris, C.: Guest editorial: special issue on clouds for social computing. IEEE Trans. Serv. Comput. Serv. Comput. 7(3), 329–332 (2014)
Pasupuleti, S.K., Ramalingam, S., Buyya, R.: An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J. Netw. Comput. Appl. 64, 12–22 (2016)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98 (2006)
Gagné, M., Narayan, S., Safavi-Naini, R.: Threshold attribute-based signcryption. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 154–171. Springer, Heidelberg (2010)
Maji, H., Prabhakaran, M., Rosulek, M.: Attribute-based signatures: achieving attribute-privacy and collusion-resistance. Technical report, IACR Cryptology ePrint Archive (2008)
Rao, Y., Dutta, R.: Expressive attribute based signcryption with constant-size ciphertext. In: Pointcheval, D., Vergnaud, D. (eds.) AFRICACRYPT. LNCS, vol. 8469, pp. 398–419. Springer, Heidelberg (2014)
Rao, Y., Dutta, R.: Expressive bandwidth-efficient attribute based signature and signcryption in standard model. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 209–225. Springer, Heidelberg (2014)
Han, Y.L., Bai, Y.C., Fang, D.Y., Yang, X.Y.: The new attribute generalized signcryption scheme. In: Wang, H., et al. (eds.) ICYCSEE 2015, CCIS 503, pp. 353–360. Springer, Heidelberg (2015)
Boneh, D., Silverberg, A.: Applications of multilinear forms to cryptography. Contemporary Mathermatics 324(1), 71–90 (2003)
Lee, H.T., Seo, J.H.: Security analysis of multilinear maps over the integers. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol. 8616, pp. 224–240. Springer, Heidelberg (2014)
Coron, J.S., Lepoint, T., Tibouchi, M.: New multilinear maps over the integers. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. Part I, LNCS, vol. 9215, pp. 267–286. Springer, Heidelberg (2015)
Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 479–499. Springer, Heidelberg (2013)
Attrapadung, N.: Fully secure and succinct attribute based encryption for circuits from multilinear maps. Technical report, IACR Cryptology ePrint Archive (2014)
Garg, S., Gentry, C., Halevi, S., Zhandry, M.: Fully secure attribute-based encryption from multilinear maps. Technical report, IACR Cryptology ePrint Archive (2014)
Chandran, N., Raghuraman, S., Vinayagamurthy, D.: Reducing depth in constrained PRFs: from bit-fixing to NC1. In: Cheng, C.-M., et al. (eds.) PKC 2016. LNCS, vol. 9615, pp. 359–385. Springer, Heidelberg (2016). doi:10.1007/978-3-662-49387-8_14
Datta, P., Dutta, R., Mukhopadhyay, S.: Compact attribute-based encryption and signcryption for general circuits from multilinear maps. In: Biryukov, A., Goyal, V. (eds.) INDOCRYPT 2015, LNCS, vol. 9264, pp. 3–24. Springer, Heidelberg (2015)
Hohenberger, S., Sahai, A., Waters, B.: Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 494–512. Springer, Heidelberg (2013)
Brakerski, Z., Vaikuntanathan, V.: Circuit-ABE from LWE: unbounded attributes and semi-adaptive security. http://eprint.iacr.org/2016/118
Kawai, Y.: Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption. In: Lopez, J., Wu, Y. (eds.) ISPEC 2015. LNCS, vol. 9065, pp. 301–315. Springer, Heidelberg (2015)
Tang, Q., Pejo, B., Wang, H.S.: Protect both integrity and confidentiality in outsourcing collaborative filtering computations. http://eprint.iacr.org/2016/079
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Malone-Lee, J.: Identity-based signcryption. Technical report, IACR Cryptology ePrint Archive (2002)
Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, pp. 34–49. USENIX Association, Berkeley (2011)
Emura, K., Miyaji, A., Rahman, M.S.: Dynamic attribute-based signcryption without random oracles. Int. J. Appl. Crypt. 2(3), 199–211 (2012)
Han, Y.L., Lu, W.Y., Yang, X.Y.: Attribute-based signcryption for circuits from multi-linear maps. J. Sichuan Univ. (Eng. Sci. Edn.) 45(6), 27–32 (2013)
Wang, C.J., Huang, J.S.: Attribute-based signcryption with ciphertext-policy and claimpredicate mechanism. In: 7th IEEE International Conference on Computational Intelligence and Security, pp. 905–909. IEEE Press, New York (2011)
Acknowledgments
This work is supported by National Natural Science Foundation of China (61572521, 61272492), Natural Science Basic Research Plan in Shaanxi Province of China (2015JM6353) and Foundation Funding Research Project of Engineering University of Chinese Armed Police Force (WJY201523).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Chen, F., Han, Y., Jiang, D., Li, X., Yang, X. (2016). Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits. In: Che, W., et al. Social Computing. ICYCSEE 2016. Communications in Computer and Information Science, vol 623. Springer, Singapore. https://doi.org/10.1007/978-981-10-2053-7_47
Download citation
DOI: https://doi.org/10.1007/978-981-10-2053-7_47
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2052-0
Online ISBN: 978-981-10-2053-7
eBook Packages: Computer ScienceComputer Science (R0)