Threshold attribute-based signcryption with constant-size ciphertexts and public verifiability

Threshold attribute based signcryption provides the flexible access control policy, and achieves sender anonymity, confidentiality, unforgeability and collusion resilience. While, the existed schemes are inefficient for cipher text lengths are linear functions of the attributes number. The paper employ Inner-product encryption, presented the first scheme of threshold attribute based signcryption with constant-size ciphertexts. Secure analysis in the standard model shows that, the proposal achieves unforgeability against chosen-message attack and indistinguishability against chosen-plaintext attack, under chosen-attribute set. The constant-size ciphertexts of the proposal is 5 |G1| + |G2|, and has no relation with the attribute number. It reduces the communication overheads significantly. Additionally, the proposed scheme also could be verified publicly, which improves the security further more.

[1]  Jiankun Hu,et al.  Threshold Attribute-Based Signcryption in Standard Model , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[2]  Reihaneh Safavi-Naini,et al.  Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.

[3]  Cheng Chen,et al.  Combined Public-Key Schemes: The Case of ABE and ABS , 2012, ProvSec.

[4]  Jing Liu,et al.  Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks , 2015, ICA3PP.

[5]  Atsuko Miyaji,et al.  Dynamic attribute-based signcryption without random oracles , 2012, Int. J. Appl. Cryptogr..

[6]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[7]  Cheng Chen,et al.  Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost , 2011, ProvSec.

[8]  Javier Herranz,et al.  Constant Size Ciphertexts in Threshold Attribute-Based Encryption , 2010, Public Key Cryptography.

[9]  Nuttapong Attrapadung,et al.  Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.

[10]  Wenping Ma,et al.  Secure Attribute-based Threshold Signature without a Trusted Central Authority , 2012, J. Comput..

[11]  Javier Herranz,et al.  Short Attribute-Based Signatures for Threshold Predicates , 2012, CT-RSA.

[12]  Vinod Vaikuntanathan,et al.  Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices , 2012, Public Key Cryptography.

[13]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.