A Ciphertext Policy Attribute Based Signcryption Scheme with Secure and Flexible Key Evolving

Data encryption and signature technique can provide secure data protection and verification during data transmission. A data owner can choose to generate a legal signature first, then encrypt it before data sharing. However, the traditional sign-then-encrypt method not only occupies much more computation resources on digital devices, but also brings about high computation cost to the whole communication systems when data verification and key updating happens. In this paper, we utilize CP-ABE and ABS to propose a CP-ABSC scheme, which reduces the calculation burden for users in multi-party communication scenario. By security analysis, our scheme is demonstrated to realize confidentiality, unforgeability with resistance of collusion attack and traitor tracing.

[1]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[2]  Zhixin Sun,et al.  Achieving secure data access control and efficient key updating in mobile multimedia sensor networks , 2018, Multimedia Tools and Applications.

[3]  P. MuraliKrishna,et al.  SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .

[4]  Yupu Hu,et al.  An attribute-based signature scheme from lattice assumption , 2015, Wuhan University Journal of Natural Sciences.

[5]  Changji Wang,et al.  Attribute-based Signcryption with Ciphertext-policy and Claim-predicate Mechanism , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[6]  Zhixin Sun,et al.  An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing , 2016, Journal of Cloud Computing.

[7]  Ratna Dutta,et al.  Expressive Attribute Based Signcryption with Constant-Size Ciphertext , 2014, AFRICACRYPT.

[8]  Jin Li,et al.  Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..

[9]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[10]  Ximeng Liu,et al.  Provably secure attribute based signcryption with delegated computation and efficient key updating , 2017, KSII Trans. Internet Inf. Syst..

[11]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[12]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[13]  Amit Sahai,et al.  Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.

[14]  Atsuko Miyaji,et al.  Dynamic attribute-based signcryption without random oracles , 2012, Int. J. Appl. Cryptogr..

[15]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.