Skip to main content

The New Attribute-Based Generalized Signcryption Scheme

  • Conference paper
Intelligent Computation in Big Data Era (ICYCSEE 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 503))

Abstract

An attribute-based generalized signcryption scheme based on bilinear pairing has been proposed. By changing attributes, encryption-only mode, signature-only mode, and signcryption mode can be switch adaptively. It shows that the scheme achieves the semantic security under the decisional bilinear Diffie-Hellman assumption and achieves the unforgeability under the computational Diffie-Hellman assumption. It is more efficient than traditional way and can be used to secure the big data in networks.

This work is partially supported by Natural Science Foundation of China (61103231, 61272492, 61462408, 61103230), the Project funded by China Postdoctoral Science Foundation (2014M562445).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, Y., Jing, X., Cheng, X.: Network big data: present and future. Chinese Journal of Computers 36(6), 1125–1138 (2013)

    Article  Google Scholar 

  2. Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) < < cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  3. Han, Y., Yang, X.: New ECDSA-Verifable generalized signcryption. Chinese Journal of Computers 11, 2003–2012 (2006)

    MathSciNet  Google Scholar 

  4. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  5. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Goyal, V., Pandey, O., Sahai, A., et al.: Attribute based encryption for fine-grained access control

    Google Scholar 

  8. Ma, J., Prabhakaran, M., Rosulek, M.: Attribute-based signatures: achieving attribute-privacy and collusion-resistance [R/OL]. Cryptology ePrint Archive, Report 2008/328, http://eprint.iacr.org/2008/328

  9. Gagné, M., Narayan, S., Safavi-Naini, R.: Threshold attribute-based signcryption. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 154–171. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  10. Zhang, G.Y., Fu, X.J., Ma, C.G.: A Dynamic Threshold Attributes-based Signcryption Scheme. Journal of Electronics & Information Technology 34(11), 2680–2686 (2012)

    Article  Google Scholar 

  11. Liu, J., Wang, J.D., Zhuang, Y.: Attribute-Based Signcryption Scheme on Vector Space. Acta Electronica Sinica 41(4), 776–780 (2013)

    Google Scholar 

  12. Meng, X.Y., Chen, Z., Meng, X.Y.: Privacy-Preserving Decentralized Key-Policy Attribute-Based Signcryption in Cloud Computing Environments. Applied Mechanics and Materials 475, 1144–1149 (2014)

    Google Scholar 

  13. Li, J., Au, M.H., Susilo, W., et al.: Attribute-based signature and its applications. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 60–69. ACM (2010)

    Google Scholar 

  14. Chen, S.Z., Wang, H.B.: Efficient Attributes-Based Signcryption Scheme. Journal of Information Engineering University 12(5), 526–531 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Han, Y., Bai, Y., Fang, D., Yang, X. (2015). The New Attribute-Based Generalized Signcryption Scheme. In: Wang, H., et al. Intelligent Computation in Big Data Era. ICYCSEE 2015. Communications in Computer and Information Science, vol 503. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46248-5_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46248-5_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46247-8

  • Online ISBN: 978-3-662-46248-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics