TY - GEN
T1 - Constant-size threshold attribute based signcryption for cloud applications
AU - Belguith, Sana
AU - Kaaniche, Nesrine
AU - Laurent, Maryline
AU - Jemai, Abderrazak
AU - Attia, Rabah
N1 - Publisher Copyright:
Copyright © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.
PY - 2017/1/1
Y1 - 2017/1/1
N2 - In this paper, we propose a novel constant-size threshold attribute-based signcryption scheme for securely sharing data through public clouds. Our proposal has several advantages. First, it provides flexible cryptographic access control, while preserving users' privacy as the identifying information for satisfying the access control policy are not revealed. Second, the proposed scheme guarantees both data origin authentication and anonymity thanks to the novel use of attribute based signcryption mechanism, while ensuring the unlinkability between the different access sessions. Third, the proposed signcryption scheme has efficient computation cost and constant communication overhead whatever the number of involved attributes. Finally, our scheme satisfies strong security properties in the random oracle model, namely Indistinguishability against the Adaptive Chosen Ciphertext Attacks (IND-CCA2), Existential Unforgeability against Chosen Message Attacks (EUFCMA) and privacy preservation of the attributes involved in the signcryption process, based on the assumption that the augmented Multi-Sequence of Exponents Decisional Diffie-Hellman (aMSE-DDH) problem and the Computational Diffie Hellman Assumption (CDH) are hard.
AB - In this paper, we propose a novel constant-size threshold attribute-based signcryption scheme for securely sharing data through public clouds. Our proposal has several advantages. First, it provides flexible cryptographic access control, while preserving users' privacy as the identifying information for satisfying the access control policy are not revealed. Second, the proposed scheme guarantees both data origin authentication and anonymity thanks to the novel use of attribute based signcryption mechanism, while ensuring the unlinkability between the different access sessions. Third, the proposed signcryption scheme has efficient computation cost and constant communication overhead whatever the number of involved attributes. Finally, our scheme satisfies strong security properties in the random oracle model, namely Indistinguishability against the Adaptive Chosen Ciphertext Attacks (IND-CCA2), Existential Unforgeability against Chosen Message Attacks (EUFCMA) and privacy preservation of the attributes involved in the signcryption process, based on the assumption that the augmented Multi-Sequence of Exponents Decisional Diffie-Hellman (aMSE-DDH) problem and the Computational Diffie Hellman Assumption (CDH) are hard.
KW - Access Control
KW - Anonymous Data Origin Authentication
KW - Attribute based Signcryption
KW - Confidentiality
KW - Privacy
KW - Public Clouds
U2 - 10.5220/0006469202120225
DO - 10.5220/0006469202120225
M3 - Conference contribution
AN - SCOPUS:85029433036
T3 - ICETE 2017 - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications
SP - 212
EP - 225
BT - SECRYPT
A2 - Samarati, Pierangela
A2 - Obaidat, Mohammad S.
A2 - Cabello, Enrique
PB - SciTePress
T2 - 14th International Joint Conference on e-Business and Telecommunications, ICETE 2017
Y2 - 24 July 2017 through 26 July 2017
ER -