Abstract
An attribute-based generalized signcryption scheme based on bilinear pairing has been proposed. By changing attributes, encryption-only mode, signature-only mode, and signcryption mode can be switch adaptively. It shows that the scheme achieves the semantic security under the decisional bilinear Diffie-Hellman assumption and achieves the unforgeability under the computational Diffie-Hellman assumption. It is more efficient than traditional way and can be used to secure the big data in networks.
This work is partially supported by Natural Science Foundation of China (61103231, 61272492, 61462408, 61103230), the Project funded by China Postdoctoral Science Foundation (2014M562445).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wang, Y., Jing, X., Cheng, X.: Network big data: present and future. Chinese Journal of Computers 36(6), 1125–1138 (2013)
Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) < < cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Han, Y., Yang, X.: New ECDSA-Verifable generalized signcryption. Chinese Journal of Computers 11, 2003–2012 (2006)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Goyal, V., Pandey, O., Sahai, A., et al.: Attribute based encryption for fine-grained access control
Ma, J., Prabhakaran, M., Rosulek, M.: Attribute-based signatures: achieving attribute-privacy and collusion-resistance [R/OL]. Cryptology ePrint Archive, Report 2008/328, http://eprint.iacr.org/2008/328
Gagné, M., Narayan, S., Safavi-Naini, R.: Threshold attribute-based signcryption. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 154–171. Springer, Heidelberg (2010)
Zhang, G.Y., Fu, X.J., Ma, C.G.: A Dynamic Threshold Attributes-based Signcryption Scheme. Journal of Electronics & Information Technology 34(11), 2680–2686 (2012)
Liu, J., Wang, J.D., Zhuang, Y.: Attribute-Based Signcryption Scheme on Vector Space. Acta Electronica Sinica 41(4), 776–780 (2013)
Meng, X.Y., Chen, Z., Meng, X.Y.: Privacy-Preserving Decentralized Key-Policy Attribute-Based Signcryption in Cloud Computing Environments. Applied Mechanics and Materials 475, 1144–1149 (2014)
Li, J., Au, M.H., Susilo, W., et al.: Attribute-based signature and its applications. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 60–69. ACM (2010)
Chen, S.Z., Wang, H.B.: Efficient Attributes-Based Signcryption Scheme. Journal of Information Engineering University 12(5), 526–531 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Han, Y., Bai, Y., Fang, D., Yang, X. (2015). The New Attribute-Based Generalized Signcryption Scheme. In: Wang, H., et al. Intelligent Computation in Big Data Era. ICYCSEE 2015. Communications in Computer and Information Science, vol 503. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46248-5_43
Download citation
DOI: https://doi.org/10.1007/978-3-662-46248-5_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-46247-8
Online ISBN: 978-3-662-46248-5
eBook Packages: Computer ScienceComputer Science (R0)