Skip to main content
Log in

A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Attribute based signcryption (ABSC) combines the merits of ABE and ABS, which can provide both confidentiality and authentication in a single step. In this paper, we present a key insulated ciphertext policy attribute based signcryption scheme (KI-CP-ABSC) for data protection in wireless networks. In our scheme, a target access structure is embedded into ciphertexts, while user’s private key corresponds an attribute set. Only the two are matched can a receiver decrypt the ciphertexts and verify whether it is from valid data signer. We introduce key insulation mechanism into our scheme by dividing the system lifetime into several time periods. When key exposure happens, the system will evolve into the next time period to preserve the forward security. We eliminate bilinear parings in our KI-CP-ABSC thus the computation burden on the terminal devices are reduced sharply. The high efficiency and proved security make our KI-CP-ABSC a promising tool for secure data sharing in wireless environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In EUROCRYPT 2005, lecture notes in computer science (Vol. 3494, pp. 457–473). Heidelberg: Springer.

  2. Goyal, V., Pandey, O., & Sahai, A. (2006). Attribute based encryption for fine-grained access control of encrypted data. In ACM conference on computer and communications security (pp. 89–98). New York: ACM.

  3. Waters, B. (2011). Ciphertext policy attribute based encryption: An expressive, efficient, and provably secure realization. In PKC 2011, lecture notes in computer science (Vol. 6571, pp. 53–70). Heidelberg: Springer.

  4. Lewko, A., Okamoto, T., Sahai, A., & Takashima, K. (2010). Fully secure functional encryption: Attribute based encryption and (hierarchical) inner product encryption. In EUROCRYPT 2010, lecture notes in computer science (Vol. 6110, pp. 62–91). Heidelberg: Springer.

  5. Goyal, V., Jain, A., Pandey, O., & Sahai, A. (2008). Bounded ciphertext policy attribute based encryption, In 35th international colloquium, lecture notes in computer science (Vol. 5126, pp. 579–591). Heidelberg: Springer.

  6. Dodis, Y., Katz, J., Xu, S., & Yung, M. (2002). Key-insulated public-key cryptosystems. In IACR ePrint archive. http://www.iacr.org/cryptodb/data/paper.php?pubkey=11601.

  7. Guo, S. Q., & Zeng, Y. P. (2008). Attribute based signature scheme. In International conference on information security and assurance 2008, IEEE, pp. 509–511.

  8. Maji, H., Prabhakaran, M., & Rosulek, M. (2011). Attribute based signatures. In CT-RSA 2011 (pp. 376–392). Heidelberg: Springer.

  9. Zheng, Y. L. (1997). Digital signcryption or how to achieve cost (signature & encryption) ≪cost (signature) + cost (encryption). In CRYPTO’97. Lecture notes in computer science (Vol. 1294, pp.165–179). Heidelberg: Springer.

  10. Zhu, G., Xiong, H., & Qin, Z. (2014). Fully secure identity based key-insulated signcryption in the standard model. Wireless Personal Communications, 79(2), 1401–1416.

    Article  Google Scholar 

  11. Li, F. G., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.

    Article  MathSciNet  MATH  Google Scholar 

  12. Shi, W. B., Kumar, N., Gong, P., & Zhang, Z. Z. (2014). Cryptanalysis and improvement of a certificate less signcryption scheme without bilinear pairing. Frontiers of Computer Science, 8(4), 656–666.

    Article  MATH  Google Scholar 

  13. Wang, C. J., & Huang, J. S. (2011). Attribute based signcryption with ciphertext policy and claim predicate mechanism. In CIS 2011, pp. 905–909, IEEE.

  14. Hu, C. Q., & Zhang, N. (2013). Body area network security: A fuzzy attribute based signcryption scheme. IEEE Journal on Selected Areas in Communications, 31(9), 37–46.

    Article  Google Scholar 

  15. Liu, Z. H., Hu, Y. P., Zhang, X. S., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.

    Article  MathSciNet  MATH  Google Scholar 

  16. Hong, H. S., & Sun, Z. X. (2016). An efficient and secure attribute based signcryption scheme with LSSS access structure. Springerplus, 5(644), 1–10.

    Google Scholar 

  17. Hu, C. Q., Cheng, X. Z., & Tian, Z. (2016). An attribute-based signcryption scheme to secure attribute-defined multicast communications. In 11th secureComm. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering (Vol. 164, pp. 418–437). Heidelberg: Springer.

  18. Peng, C. G., Wang, W. R., & Tian, Y. L. (2016). An attribute-based signcryption scheme and its application in information hiding. Chinese Journal of Electronics, 25(4), 632–640.

    Article  Google Scholar 

  19. Chen, J., Chen, K., & Wang, Y. (2012). Identity-based key-insulated signcryption. Informatica, 23, 27–45.

    MathSciNet  MATH  Google Scholar 

  20. Attrapadung, N., Libert, B., & DePanafieu, E. (2011). Expressive key-policy attribute based encryption with constant-size ciphertexts. In PKC 2011, lecture notes in computer science (Vol. 6571, pp. 90–108). Heidelberg: Springer.

  21. Yu, S., Wang, C., & Ren, K. (2010). Attribute based data sharing with attribute revocation. In Proceedings of the 5th symposium on information, computer and communications security, pp. 261–270. New York: ACM.

  22. Junbeom, H. (2013). Improving security and efficiency in attribute based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271–2282.

    Article  Google Scholar 

  23. Zhu, G., Xiong, H., Wang, R., & Qin, Z. (2014). An improvement of an identity-based key-insulated signcryption. In Proceedings of international conference on computer science and information technology advances in intelligent systems and computing, Vol. 255, pp. 97–104.

  24. Hong, H. S., & Sun, Z. X. (2016). High efficient key-insulated attribute based encryption scheme without bilinear pairing operations. Springerplus, 5(131), 1–12.

    Google Scholar 

  25. Yin, A., & Liang, H. (2015). On security of a certificateless hybrid signcryption scheme. Wireless Personal Communications, 85(4), 1727–1739.

    Article  MathSciNet  Google Scholar 

  26. Hong, H. S., & Sun, Z. X. (2016). An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing. Journal of Cloud Computing, 5(2), 1–8.

    Google Scholar 

  27. Yao, X.X., Chen, Z., & Ye, T. (2015). A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems. 49, 104–112.

    Article  Google Scholar 

  28. Hong, H. S., Sun, Z. X., & Liu, X. M. (2016). A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud. KSII Transactions on Internet and Information Systems, 10(5), 2394–2406.

    Google Scholar 

Download references

Acknowledgments

This research is supported by the National Natural Science Foundation of China (60973140, 61170276, and 61373135).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hanshu Hong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hong, H., Sun, Z. A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks. Wireless Pers Commun 95, 1215–1228 (2017). https://doi.org/10.1007/s11277-016-3825-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3825-4

Keywords

Navigation