Attribute-Based Signcryption:
Signer Privacy, Strong Unforgeability and IND-CCA Security in

Adaptive-Predicates Model (Extended Version)

Tapas Pandit1+, Sumit Kumar Pandey2, and Rana Barua1

 

1Stat-Math Unit, Indian Statistical Institute, Kolkata, India

{tapasgmmath, ranabarua.isi}@gmail.com

 

2School of Physical and Mathematical Sciences

Nanyang Technological University, Singapore

emailpandey@gmail.com 

 

Abstract

Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption (ABE) and Attribute-Based Signature (ABS), where one can have the message confidentiality and authenticity together. Since the signer privacy is captured in security of ABS, it is quite natural to expect that the signer privacy will also be preserved in ABSC. In this paper, first we propose an ABSC scheme which is weak existential unforgeable and IND-CCA secure in adaptive-predicates models and, achieves signer privacy. Then, by applying strongly unforgeable one-time signature (OTS), the above scheme is lifted to an ABSC scheme to attain strong existential unforgeability in adaptive-predicates model. Both the ABSC schemes are constructed on common setup, i.e the public parameters and key are same for both the encryption and signature modules. Our first construction is in the flavor of CtE&S  paradigm, except one extra component that will be computed using both signature components and ciphertext components. The second proposed construction follows a new paradigm (extension of CtE&S ), we call it “Commit then Encrypt and Sign then Sign” (CtE&S ). The last signature is generated using a strong OTS scheme. Since, the non-repudiation is achieved by CtE&S  paradigm, our systems also achieve the same.

Keywords: implantable medical devices, security, wireless sensor network

+: Corresponding author: Siamak Aram
Laboratorio di Neuronica , Dip. Elettronica e Telecomunicazioni - Politecnico di Torino c.so Duca d. Abruzzi 24 10129 Torino - Italy, Tel: +39-011-564-4065

 

Journal of Internet Services and Information Security (JISIS), 6(3): 61-113, August 2016 [pdf]