×

Attribute-based signcryption scheme based on linear codes. (English) Zbl 1457.94181

Summary: Compared with traditional schemes in which encryption follows a signature, the attribute-based signcryption (ABSC) scheme not only costs less both in terms of both computation and communication but also provides message confidentiality, ensures the authenticity of a message, and attests to the attributes of the sender. In this paper, we first formalize a selective-attribute security model of the attribute-based signcryption based on linear codes. Then, we construct a flexible and efficient ABSC scheme based on a secret sharing method called Linear Codes Secret Sharing Scheme. This ABSC scheme breaks the threshold limit and employs diverse attribute sets by constructing the access structures on linear codes. In addition, our scheme achieves confidentiality against chosen-ciphertext attacks and unforgeability against chosen-message attacks in the selective-attribute model. Finally, we compare the proposed scheme with existing schemes in terms of their properties and efficiency.

MSC:

94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
94B05 Linear codes (general theory)
Full Text: DOI

References:

[1] Beimel, A., Secure Schemes for Secret Sharing and Key Distribution (1996), Israel Institute of Technology: Israel Institute of Technology Technion, Haifa, Israel, Ph.d. thesis
[2] Chen, J. H.; Longc, Y.; Chen, K. F.; Guo, J., Attribute-based key-insulated signature and its applications, Inf. Sci., 275, 3, 57-67 (2014) · Zbl 1341.94018
[3] Emura, K.; Miyaji, A.; Rahman, M. S., Dynamic attribute-based signcryption without random oracles, Int. J. Appl. Cryptogr., 2, 3, 199-211 (2012) · Zbl 1276.94024
[4] Gagné, M.; Narayan, S.; Safavi-Naini, R., Threshold attribute-based signcryption, Security and Cryptography for Networks, 154-171 (2010) · Zbl 1291.94086
[5] Guo, Z.; Li, M.; Fan, X., Attribute-based ring signcryption scheme, secur, Commun. Netw., 6, 6, 790-796 (2013)
[6] Hu, C.; Zhang, N.; Li, H.; Cheng, X.; Liao, X., Body area network security: a fuzzy attribute-based signcryption scheme, IEEE J. Sel. Areas Commun., 31, 9, 37-46 (2013)
[7] Liu, J. H.; Huang, X. Y.; Liu, J. K., Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption, Future Generation Comp. Sys., 52, 67-76 (2015)
[8] Li, Z. H.; Xue, T.; Lai, H., Secret sharing schemes from binary linear codes, Inf. Sci., 181, 22, 4412-4419 (2010) · Zbl 1225.94025
[9] Maji, H.; Prabhakaran, M.; Rosulek, M., Attribute-based signature: achieving attribute privacy and collusion resistance, Proceedings of CT-RSA 2011, LNCS 6558, 376-392 (2011), Springer-Verlag: Berlin · Zbl 1284.94093
[10] Massey, J. L., Some Applications of Coding Theory in Cryptography (1995), Formara Ltd: Formara Ltd Cryptography and Coding IV, England
[11] Mao, X. P.; Lai, J. Z.; X. Mei, Q.; Weng, J., Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption, IEEE Trans. Dependable Secure Comput., 13, 5, 533-546 (2016)
[12] Rao, Y. S.; Dutta, R., Bandwidth-efficient attribute-based key-insulated signatures with message recovery, Inf. Sci., 369, 10, 648-673 (2016) · Zbl 1428.94110
[13] Sahai, A.; Waters, B., Fuzzy identity-based encryption, (Cramer, R., EUROCRYPT (2005)), 457-473 · Zbl 1137.94355
[14] Shi, Y. F.; Zheng, Q. J.; Liu, J. Q.; Han, Z., Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation, Inf. Sci., 295, 20, 221-231 (2015) · Zbl 1360.68444
[15] Su, J. S.; Cao, D.; Zhao, B. K.; Wang, X. F., Ilsun you, ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things, Future Generation Comput. Sys., 33, 2, 11-18 (2014)
[16] Selvi, S. S.D.; Vivek, S. S.; Vinayagamurthy, D.; Rangan, C. P., ID based signcryption scheme in standard model, Provable Security, 35-52 (2012), Springer · Zbl 1303.94102
[17] Song, Y.; Li, Z. H.; Li, Y. M.; Li, J., A new multi-use multi-secret sharing scheme based on the duals of minimal linear codes, Secur. Commun. Netw., 8, 2, 202-211 (2015)
[18] Waters, B., Ciphertext policy attribute based encryption: an expressive, efficient, and provably secure realization, PKC, 53-70 (2011) · Zbl 1291.94165
[19] Wei, J.; Hu, X.; Liu, W., Traceable attribute-based signcryption, Secur. Commun. Netw., 7, 12, 2302-2317 (2014)
[20] X. Yao, X.; Chen, Z.; Tian, Y., A lightweight attribute-based encryption scheme for the internet of things, Future Generation Comput. Sys., 49, 104-112 (2015)
[21] Zhang, F. T.; Shen, L. M.; Wu, G., Notes on the security of certificateless aggregate signature schemes, Inf. Sci., 287, 10, 32-37 (2014) · Zbl 1355.94078
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.