Abstract
Attribute based signcryption (ABSC) combines the merits of ABE and ABS, which can provide both confidentiality and authentication in a single step. In this paper, we present a key insulated ciphertext policy attribute based signcryption scheme (KI-CP-ABSC) for data protection in wireless networks. In our scheme, a target access structure is embedded into ciphertexts, while user’s private key corresponds an attribute set. Only the two are matched can a receiver decrypt the ciphertexts and verify whether it is from valid data signer. We introduce key insulation mechanism into our scheme by dividing the system lifetime into several time periods. When key exposure happens, the system will evolve into the next time period to preserve the forward security. We eliminate bilinear parings in our KI-CP-ABSC thus the computation burden on the terminal devices are reduced sharply. The high efficiency and proved security make our KI-CP-ABSC a promising tool for secure data sharing in wireless environments.
Similar content being viewed by others
References
Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In EUROCRYPT 2005, lecture notes in computer science (Vol. 3494, pp. 457–473). Heidelberg: Springer.
Goyal, V., Pandey, O., & Sahai, A. (2006). Attribute based encryption for fine-grained access control of encrypted data. In ACM conference on computer and communications security (pp. 89–98). New York: ACM.
Waters, B. (2011). Ciphertext policy attribute based encryption: An expressive, efficient, and provably secure realization. In PKC 2011, lecture notes in computer science (Vol. 6571, pp. 53–70). Heidelberg: Springer.
Lewko, A., Okamoto, T., Sahai, A., & Takashima, K. (2010). Fully secure functional encryption: Attribute based encryption and (hierarchical) inner product encryption. In EUROCRYPT 2010, lecture notes in computer science (Vol. 6110, pp. 62–91). Heidelberg: Springer.
Goyal, V., Jain, A., Pandey, O., & Sahai, A. (2008). Bounded ciphertext policy attribute based encryption, In 35th international colloquium, lecture notes in computer science (Vol. 5126, pp. 579–591). Heidelberg: Springer.
Dodis, Y., Katz, J., Xu, S., & Yung, M. (2002). Key-insulated public-key cryptosystems. In IACR ePrint archive. http://www.iacr.org/cryptodb/data/paper.php?pubkey=11601.
Guo, S. Q., & Zeng, Y. P. (2008). Attribute based signature scheme. In International conference on information security and assurance 2008, IEEE, pp. 509–511.
Maji, H., Prabhakaran, M., & Rosulek, M. (2011). Attribute based signatures. In CT-RSA 2011 (pp. 376–392). Heidelberg: Springer.
Zheng, Y. L. (1997). Digital signcryption or how to achieve cost (signature & encryption) ≪cost (signature) + cost (encryption). In CRYPTO’97. Lecture notes in computer science (Vol. 1294, pp.165–179). Heidelberg: Springer.
Zhu, G., Xiong, H., & Qin, Z. (2014). Fully secure identity based key-insulated signcryption in the standard model. Wireless Personal Communications, 79(2), 1401–1416.
Li, F. G., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.
Shi, W. B., Kumar, N., Gong, P., & Zhang, Z. Z. (2014). Cryptanalysis and improvement of a certificate less signcryption scheme without bilinear pairing. Frontiers of Computer Science, 8(4), 656–666.
Wang, C. J., & Huang, J. S. (2011). Attribute based signcryption with ciphertext policy and claim predicate mechanism. In CIS 2011, pp. 905–909, IEEE.
Hu, C. Q., & Zhang, N. (2013). Body area network security: A fuzzy attribute based signcryption scheme. IEEE Journal on Selected Areas in Communications, 31(9), 37–46.
Liu, Z. H., Hu, Y. P., Zhang, X. S., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.
Hong, H. S., & Sun, Z. X. (2016). An efficient and secure attribute based signcryption scheme with LSSS access structure. Springerplus, 5(644), 1–10.
Hu, C. Q., Cheng, X. Z., & Tian, Z. (2016). An attribute-based signcryption scheme to secure attribute-defined multicast communications. In 11th secureComm. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering (Vol. 164, pp. 418–437). Heidelberg: Springer.
Peng, C. G., Wang, W. R., & Tian, Y. L. (2016). An attribute-based signcryption scheme and its application in information hiding. Chinese Journal of Electronics, 25(4), 632–640.
Chen, J., Chen, K., & Wang, Y. (2012). Identity-based key-insulated signcryption. Informatica, 23, 27–45.
Attrapadung, N., Libert, B., & DePanafieu, E. (2011). Expressive key-policy attribute based encryption with constant-size ciphertexts. In PKC 2011, lecture notes in computer science (Vol. 6571, pp. 90–108). Heidelberg: Springer.
Yu, S., Wang, C., & Ren, K. (2010). Attribute based data sharing with attribute revocation. In Proceedings of the 5th symposium on information, computer and communications security, pp. 261–270. New York: ACM.
Junbeom, H. (2013). Improving security and efficiency in attribute based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271–2282.
Zhu, G., Xiong, H., Wang, R., & Qin, Z. (2014). An improvement of an identity-based key-insulated signcryption. In Proceedings of international conference on computer science and information technology advances in intelligent systems and computing, Vol. 255, pp. 97–104.
Hong, H. S., & Sun, Z. X. (2016). High efficient key-insulated attribute based encryption scheme without bilinear pairing operations. Springerplus, 5(131), 1–12.
Yin, A., & Liang, H. (2015). On security of a certificateless hybrid signcryption scheme. Wireless Personal Communications, 85(4), 1727–1739.
Hong, H. S., & Sun, Z. X. (2016). An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing. Journal of Cloud Computing, 5(2), 1–8.
Yao, X.X., Chen, Z., & Ye, T. (2015). A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems. 49, 104–112.
Hong, H. S., Sun, Z. X., & Liu, X. M. (2016). A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud. KSII Transactions on Internet and Information Systems, 10(5), 2394–2406.
Acknowledgments
This research is supported by the National Natural Science Foundation of China (60973140, 61170276, and 61373135).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hong, H., Sun, Z. A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks. Wireless Pers Commun 95, 1215–1228 (2017). https://doi.org/10.1007/s11277-016-3825-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3825-4