Attribute based generalized signcryption for online social network

Online social network has brought varies and flexible secure demands. Attribute based generalized signcryption (ABGSC) could bring the combined or separate confidentiality and authentication adaptively, and eliminate the bottleneck of traditional public key encryption. We proposed an attribute based generalized signcryption with non-monotonic access structures, which can perform signcryption, encryption and signature adaptively. The non-monotonic access structure is used to realize the “OR”, “AND”, “NEG” and “Threshold” operations; the Inner Product is used to achieve constant cipher text. Under the encryption mode, the cipher text length is 2|G|+nm, under the signature mode it is 3|G|+nm, and under the signcryption mode is 5|G|+nm, so we can improve the efficiency greatly. Under the q-DBDHE assumption in the stand model, the scheme is proved confidential under the signcryption and encryption mode, and is proved unforgeable under the signcryption and signature mode.

[1]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[2]  Wang Yuan,et al.  Network Big Data: Present and Future: Network Big Data: Present and Future , 2014 .

[3]  Aijun-J. Ge,et al.  Attribute-based Signature Scheme with Constant Size Signature ⋆ , 2012 .

[4]  Liu Lian Certificateless Generalized Signcryption Scheme without Random Oracles , 2012 .

[5]  Nuttapong Attrapadung,et al.  Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.

[6]  Long Zhao,et al.  Certificateless Generalized Signcryption Scheme without Random Oracles: Certificateless Generalized Signcryption Scheme without Random Oracles , 2012 .

[7]  Javier Herranz,et al.  Short Attribute-Based Signatures for Threshold Predicates , 2012, CT-RSA.

[8]  Yiliang Han,et al.  Adaptive secure multicast in wireless networks , 2009, Int. J. Commun. Syst..

[9]  Reihaneh Safavi-Naini,et al.  Threshold Attribute-Based Signcryption , 2010, SCN.

[10]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[11]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[12]  Manoj Prabhakaran,et al.  Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance , 2008, IACR Cryptol. ePrint Arch..

[13]  Yuanzhuo Wang,et al.  Network Big Data: Present and Future: Network Big Data: Present and Future , 2014 .

[14]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[15]  Hui-fang Ji,et al.  Identity Based Generalized Signcryption Scheme for Multiple PKGs in Standard Model: Identity Based Generalized Signcryption Scheme for Multiple PKGs in Standard Model , 2011 .

[16]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[17]  Han Yi New ECDSA-Verifiable Generalized Signcryption , 2006 .