Skip to main content

Privacy Preserving Signcryption Scheme

  • Conference paper
  • First Online:
Distributed Computing and Internet Technology (ICDCIT 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10109))

Abstract

Signcryption is a public-key cryptographic primitive that is a synthesis of encryption and digital signature schemes. We present a signcryption scheme using anonymous attribute based encryption. The scheme uses the notion of identity-based digital signature on the message encrypted under the attribute based encryption scheme. The scheme provides both sender and receiver anonymity, in particular, only the legitimate receiver can identify the sender after the successful decryption operation. We show that the scheme is secure against adaptive chosen ciphertext attack and chosen message attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 89–98 (2006)

    Google Scholar 

  2. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 321–334 (2007)

    Google Scholar 

  3. Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 456–465 (2007)

    Google Scholar 

  4. Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 579–591. Springer, Heidelberg (2008). doi:10.1007/978-3-540-70583-3_47

    Chapter  Google Scholar 

  5. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13190-5_4

    Chapter  Google Scholar 

  6. Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191–208. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_11

    Chapter  Google Scholar 

  7. Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 195–203 (2007)

    Google Scholar 

  8. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_4

    Chapter  Google Scholar 

  9. Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N.: Generic constructions for chosen-ciphertext secure attribute based encryption. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 71–89. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_5

    Chapter  Google Scholar 

  10. Kapadia, A., Tsang, P.P., Smith, S.W.: Attribute-based publishing with hidden credentials and hidden policies. In: Proceedings of Network and Distributed System Security Symposium, vol. 7, pp. 179–192 (2007)

    Google Scholar 

  11. Yu, S., Ren, K., Lou, W.: Attribute-based content distribution with hidden policy. In: Proceedings of Workshop on Secure Network Protocols, pp. 39–44. IEEE (2008)

    Google Scholar 

  12. Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111–129. Springer, Heidelberg (2008). doi:10.1007/978-3-540-68914-0_7

    Chapter  Google Scholar 

  13. Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 347–362. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04474-8_28

    Chapter  Google Scholar 

  14. Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H.: Anonymous attribute-based encryption supporting efficient decryption test. In: Proceedings of the ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 511–516 (2013)

    Google Scholar 

  15. Chaudhari, P., Das, M.L., Mathuria, A.: On anonymous attribute based encryption. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 378–392. Springer, Heidelberg (2015). doi:10.1007/978-3-319-26961-0_23

    Chapter  Google Scholar 

  16. Rao, Y.S., Dutta, R.: Recipient anonymous ciphertext-policy attribute based encryption. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 329–344. Springer, Heidelberg (2013). doi:10.1007/978-3-642-45204-8_25

    Chapter  Google Scholar 

  17. Zheng, Y.: Digital Signatures or how to achievecost (Signature & Encryption)<< Cost (Signature) +Cost(Encryption). In: Kaliski, B.S. (ed.) Advances in Cryptology - CRYPTO. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  18. Malone-Lee, J.: Identity-Based Signcryption. IACR Cryptology eprint Archieve, report 2002/098 (2002)

    Google Scholar 

  19. Libert, B., Quisquater, J.J.: New identity based signcryption schemes from pairings. IACR Cryptology ePrint Archive, report 2003/23 (2003)

    Google Scholar 

  20. Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362–379. Springer, Heidelberg (2005). doi:10.1007/978-3-540-30580-4_25

    Chapter  Google Scholar 

  21. Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005). doi:10.1007/11593447_28

    Chapter  Google Scholar 

  22. Boyen, X.: Identity-based signcryption. In: Dent, A.W., Zheng, Y. (eds.) Practical Signcryption. Information Security and Cryptography, pp. 195–216. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  23. Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based signcryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 195–206. Springer, Heidelberg (2006). doi:10.1007/11780656_17

    Chapter  Google Scholar 

  24. Ming, Y., Zhao, X., Wang, Y.: Multi-receiver identity-based signcryption scheme in the standard model. In: Liu, B., Chai, C. (eds.) ICICA 2011. LNCS, vol. 7030, pp. 487–494. Springer, Heidelberg (2011). doi:10.1007/978-3-642-25255-6_62

    Chapter  Google Scholar 

  25. Pang, L., Gao, L., Li, H., Wang, Y.: Anonymous multi-receiver ID-based signcryption scheme. Inf. Secur. IET 9(3), 194–201 (2015)

    Article  Google Scholar 

  26. Wang, C., Huang, J.: Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism. In: Proceedings of the International Conference on Computational Intelligence and Security, pp. 905–909. IEEE (2011)

    Google Scholar 

  27. Gagné, M., Narayan, S., Safavi-Naini, R.: Threshold attribute-based signcryption. In: Garay, J.A., Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 154–171. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15317-4_11

    Chapter  Google Scholar 

  28. Emura, K., Miyaji, A., Rahman, M.S.: Dynamic attribute-based signcryption without random oracles. Int. J. Appl. Cryptogr. 2(3), 199–211 (2012)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Payal Chaudhari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Chaudhari, P., Das, M.L. (2017). Privacy Preserving Signcryption Scheme. In: Krishnan, P., Radha Krishna, P., Parida, L. (eds) Distributed Computing and Internet Technology. ICDCIT 2017. Lecture Notes in Computer Science(), vol 10109. Springer, Cham. https://doi.org/10.1007/978-3-319-50472-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50472-8_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50471-1

  • Online ISBN: 978-3-319-50472-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics