PENG Changgen, WANG Weiru, TIAN Youliang, et al., “An Attribute-Based Signcryption Scheme and Its Application in Information Hiding,” Chinese Journal of Electronics, vol. 25, no. 4, pp. 632-640, 2016, doi: 10.1049/cje.2016.07.007
Citation: PENG Changgen, WANG Weiru, TIAN Youliang, et al., “An Attribute-Based Signcryption Scheme and Its Application in Information Hiding,” Chinese Journal of Electronics, vol. 25, no. 4, pp. 632-640, 2016, doi: 10.1049/cje.2016.07.007

An Attribute-Based Signcryption Scheme and Its Application in Information Hiding

doi: 10.1049/cje.2016.07.007
Funds:  This work is supported by the National Natural Science Foundation of China (No.61262073, No.60963023, No.61363068), China Postdoctoral Science Foundation (No.2013M530705), the Natural Science Foundation of Guizhou Province of China (No.20092113, No.20132112), the Special Foundation for Improving Research Condition of High-level Talents of Guizhou Province (No.TZJF-2008-33), and the Doctoral Scientific Foundation of Guizhou University (No.2007-040, No.2012-024).
  • Received Date: 2014-07-03
  • Rev Recd Date: 2014-08-13
  • Publish Date: 2016-07-10
  • In order to provide a secure, reliable and flexible way to hide information, a new attribute-based signcryption scheme based on ciphertext-policy and its security proof are presented. This scheme not only can simultaneously fulfil both authentication and confidentiality in an efficient way, but also implements a hierarchical decryption in one group and also between different groups according to user's authority (different users satisfying the same access structure can be considered as a group). We provide a solution to information hiding using our proposed scheme which can embed ciphertext into a carrier. Because the hierarchical decryption property, different users will obtain different message from the same carrier. Illegal user can not get any information without private key because message existed in the carrier is ciphertext. Such solution can be applied in sharing important message under the public network.
  • loading
  • Y. Zheng, "Digital signcryption or how to achieve cost(signature & encryption)
    X. Boyen, "Multipurpose identity-based signcryption", Proc. of Annual International Cryptology Conference, Santa Barbara, California, USA, pp.383-399, 2003.
    L. Chen and J. Malone-Lee, "Improved identity-based signcryption", Proc. of International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, pp.362-379, 2005.
    Y.X. Sun and H. Li, "ID-based signcryption KEM to multiple recipients", Chinese Journal of Electronics, Vol.20, No.2, pp.317-322, 2011.
    X.Y. Huang, F.T. Zhang and W. Wu, "An identity-based ring signcryption scheme", Acta Electronica Sinica, Vol.34, No.2, pp.263-266, 2006. (in Chinese)
    C.G. Peng, X. Li and W.J. Luo, "A generalized group-oriented threshold signcryption schemes", Acta Electronica Sinica, Vol.35, No.1, pp.64-67, 2007. (in Chinese)
    V. Goyal, O. Pandey, A. Sahai, et al., "Attribute-based encryption for fine-grained access control of encrypted data", Proc. of ACM Conference on Computer and Communications Security, New York, USA, pp.89-98, 2006.
    J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", Proc. of IEEE Symposium on Security and Privacy, Berkeley, California, pp.321-334, 2007.
    M. Gagne, S. Narayan and R. Safavi-Naini, "Threshold attribute-based signcryption", Proc. of 7th International Conference of Security and Cryptography for Networks, Amalfi, Italy, pp.154-171, 2010.
    C.J. Wang and J.S. Huang, "Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism", Proc. of International Conference on Computational Intelligence and Security (CIS), Hainan, China, pp.905-909, 2011.
    K. Emura, A. Miyaji and M.S. Rahman, "Dynamic attribute-based signcryption without random oracles", International Journal of Applied Cryptography, Vol.2, No.3, pp.199-211, 2012.
    J. Liu, J.D. Wang and Y. Zhuang, "Attribute-based signcryption scheme on vector space", Acta Electronica Sinica, Vol.41, No.4, pp.776-780, 2013. (in Chinese)
    A. Sahai and B. Waters, "Fuzzy identity-based encryption", Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, pp.457-473, 2005.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (551) PDF downloads(1318) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return