Skip to main content
SpringerPlus logoLink to SpringerPlus
. 2016 May 17;5:644. doi: 10.1186/s40064-016-2286-2

An efficient and secure attribute based signcryption scheme with LSSS access structure

Hanshu Hong 1, Zhixin Sun 1,
PMCID: PMC4870580  PMID: 27330910

Abstract

Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible access control with authentication for data sharing between users, but realizing both functions will bring about too much computation burden. In this paper, we combine the advantages of CP-ABE with ABS and propose a ciphertext policy attribute based signcryption scheme. In our scheme, only legal receivers can decrypt the ciphertext and verify the signature signed by data owner. Furthermore, we use linear secret sharing scheme instead of tree structure to avoid the frequent calls of recursive algorithm. By security and performance analysis, we prove that our scheme is secure as well as gains higher efficiency.

Keywords: Attribute based, Signcryption, LSSS structure, Security

Background

The notion of attribute based encryption (ABE) was first proposed by Sahai and Waters (2005). Since then, many typical ABE (Goyal et al. 2006; Waters 2011; Lewko et al. 2010; Goyal et al. 2008; Tian and Peng 2014) schemes have been proposed. In ABE, user’s access privileges are described by a set of attributes instead of a single identity string. A user can get access to the ciphertext only if his attributes satisfy with the policy which is set by the data owner. Due to its capability of providing fine-grained and flexible access control, ABE appears to be a promising tool for data encryption and data sharing between users. Attribute based signature (ABS) has been developed as a primitive to solve the data authentication problem of ABE, which was first introduced (Guo and Zeng 2008) in 2008. In ABS mechanisms (Maji et al. 2011), a signer can sign a message with the private key component corresponds with the attributes he processes. The signature can be verified to a certain set of attributes or an attribute access structure of which the data owner claims.

The notion of signcryption (Zheng 1997; Lim and Lee 1998; Tan 2008; Selvi et al. 2008) can be introduced to attribute based cryptography to present attribute based signcryption schemes. Signcryption (Paulo et al. 2005; Li and Khan 2012) is a single logical step to complete the function of both signature and encryption at the same time, thus it achieves better efficiency then the traditional sign-then-encryption method. However, research on attribute based signcryption has not been received much attention from academia. Wang and Huang (2011) proposed a signcryption scheme from pairings. Their scheme provides the same functions of encryption and authentication and is proved to be more efficient than the simply combination of “CP-ABE + CP-ABS”. Hu and Zhang (2013) proposed a fuzzy attribute based signcryption and apply it in the BAN (Body area network). Their scheme is a novel security mechanism and achieves outstand performance. However, the proposed (Wang and Huang 2011; Hu and Zhang 2013) schemes are based on the tree structure (Bethencourt et al. 2007) and threshold structure, which need frequent calls of recursive algorithm for the purpose of recovering the secret encryption component. Thus this will bring about external computation overhead.

To better improve the efficiency of attribute based signcryption scheme, in this paper, we propose an improved ciphertext policy attribute based signcryption scheme. We use LSSS structure (Beimel 1996) instead of access tree structure to avoid the frequent calls of recursive algorithm. By security and performance analysis, we prove that our scheme is secure as well as achieves higher efficiency.

Preliminaries

Bilinear pairings

Let G1 and G2 be two cyclic groups of prime order q. Let g be a generator of G1. A bilinear pairing e^: G1×G1G2, G2 has these features:

Bilinearity: for a,bZq, we have e^ga,gb=e^g,gab.

Non-degeneracy: for any gG1, e^g,g1.

Computability: the value of e^u,v can be computed for any u,vG1.

Hardness assumption

Discrete logarithm assumption (DL)

Given P,QG1, no probabilistic polynomial-time (PPT) algorithm can find an integer nZq such that Q=Pn with non-negligible probability.

Decision bilinear Diffie–Hellman problem (DBDH)

For a,b,c,zZq, given {g,ga,gb,gc,z}, no probabilistic polynomial-time (PPT) algorithm can distinguish the following tuples A=ga,B=gb,C=gc,e^g,gabc and A=ga,B=gb,C=gc,e^g,gz with non-negligible probability.

Our model and assumptions

Formulized definitions of our scheme

Our scheme consists of the following algorithms:

Setup On input security parameter, it returns the system public parameter PK and master key MK. PK is shared by users while MK is kept private by the private key generator.

PrivateKeygeneration On input the system public key PK, the master key MK, and an attribute set Ai, private key generator (PKG) outputs Di as the user’s attribute private key. To distinguish the role of signers and receivers, in this paper, we define the private key of signer as Ds while the private key of receiver as Dr.

Signcrypt This algorithm is run by a signer which takes the systems public parameter PK, a plaintext M, signer’s private key Ds and an access structure as input. Then it outputs the ciphertext CTU,V,E.

De-signcrypt This algorithm is run by the receiver. The algorithm takes as input the ciphertext CTU,V,E and the receiver’s private key Dr, it outputs either the plaintext M or the reject symbol .

Security model

Definition 1

Our scheme has the essential confidentiality under chosen plaintext attack in selected model if no Adversary has non-negligible advantage in the challenge game.

Setup:Adversary claims a challenging attribute set γ. Challenger runs setup algorithm to obtain PK. It sends PK to Adversary.

Adversary may make the following queries to Challenger.

Privatekeygenerationquery:Adversary can request the private key of an attribute set (expect for the challenging attribute set).

Challenge:Adversary chooses two plaintexts M0 and M1. Challenger chooses μ0,1 randomly and calculates C=SigncryptPK,Mμ,Ds. Then Challenger sends the result back to Adversary.

Adversary cannot ask Challenger for Privatekeygeneration query for the challenging attribute set γ.

Adversary outputs a value μ as a conjecture of μ. If μ=μ then Adversary wins the game.

Denote Prμ=μ-12 to be the advantage of Adversary.

Definition 2

Our scheme has the existential unforgeability under chosen message attack in the selective model if no Adversary has non-negligible advantage in the challenge game.

Setup:Adversary claims a challenging attribute set γ. Challenger takes a security parameter and runs setup procedure to obtain the system parameters. It sends the PK to Adversary.

Privatekeygenerationquery:Adversary can request the private key of an attribute set (expect for the challenging attribute set).

Signcryptquery:Adversary chooses an attribute set Ai, an access structure, a plaintext M. Challenger calculates Ds and runs the signcrypt procedure to calculate the ciphertext CT=SigncryptPK,M,Di,γ. After then, Challenger sends CT to Adversary.

Challenge: Adversary computes a 3-tuple CTU,V,E, while CTU,V,E was not from a igncryptquery.

Challenger de-signcrypts the ciphertext by running the De-signcrypt{PK,CT,Dr }.

Adversary wins the game if the output of De-signcrypt is not .

Denote AdvA=PrResult=M to be the advantage of Adversary.

Our contributions to attribute based signcryption scheme

Let G1 and G2 be two cyclic groups of prime order p, while g is the generator of G1. Let e^:G1×G1G2 be a bilinear pairing. Define 2 functions: H1,H2. The function H1 associates attributes to rows of access Matrix (the number of rows Zp). H2:0,1nZp.

Setup PKG randomly chooses αiZp for each attribute i in the system. Besides, PKG chooses another secret number αZp. The system outputs the system master keys gα,αi, public parameters e^g,gα,e^g,gαiH1i,H1,H2,G1,G2,p,g.

Privatekeygeneration For signer’s attribute set Aj, PKG chooses uZp and calculates its private key Ds,1,Ds,2,Ds,3=gu+αjH1j,gα+u,e^g,gu. Likewisely, for receiver’s attribute set Ai PKG chooses hZp calculates its private key Dr,1,Dr,2,Dr,3=gαiH1i+h,gα+h,e^g,gh. PKG transfers the private key to each user through secure channels.

Signcrypt Signer firstly picks xZp and a LSSS access structure Matrix, then chooses random vector v=x,vr1,vr2,,vrnZpn. Let λi=v·Matrixi. (Matrixi stands for the ith row of the corresponding Matrix). Finally, singer randomly picks riZp and calculates the signcryption information:

U=e^g,gjSαjH1j·x
t=H2(U||M)
V:v1=jSDs,1x+t,v2=jSDs,3x+t
E:C0=Me^g,gαx,C1=gx,C2,i=e^g,g-αiH1j·λi,C3,i=gλi 1

Signer sends CT=U,V,E to the receiver.

De-signcrypt Let ωZpil be a set of constants such that if {λi} are valid shares of secret x according to Matrix, then ilωiλi=x. Receiver calculates M as follows:

M=C0ile^C3,Dr,1)·C2,iωi·e^C1,Dr,2) 2

Then, receiver verifies if

e^v1,g=U·v2·e^g,gjSαjH1j·t 3

If Eq. (3) holds then the algorithm outputs plaintext M with the signature. If not, it outputs reject “”.

Correctness proof:

(a) Decryption:

M=C0ile^C3,i,Dr,1)·C2,iωi·e^C1,Dr,2)=C0·e^C1,Dr,2)-1ile^gλi,gαiH1i+ue^g,g-αiH1j·λiωi=C0·e^C1,Dr,2)-1ile^g,guλiωi=Me^g,gαx·e^g,guxe^g,gαx·e^g,guilλiωi=M 4

(b) Signature verification:

t=H2(U||M)e^v1,g=e^gjSαjH1j+u·x+t,g=e^g,gjSαjH1j·x+t·e^g,gjSux+t=e^g,gjSαjH1j·x·e^g,gjSαjH1j·t·e^g,gjSux+t=U·v2·e^g,gjSαjH1j·t 5

Security and efficiency analysis

Confidentiality

Theorem 1 IfAdversary can break our scheme under chosen plaintext attack in the selective model, then a simulator can solve the DBDH problem.

Proof In the challenge game, if there exists an Adversary which has advantage ε in attacking our scheme, there exists a simulator solving the DBDH problem with an advantage of ε/2.

The simulator is constructed as follows:

Phase 1 Setup:Adversary claims a challenging attribute set γ. Challenger defines a set of attributes Ai. Let G1 and G2 be two cyclic groups of prime order p,while g is the generator of G1. Let e^:G1×G1G2 be a bilinear pairing. Define 2 functions :H1 associates attributes to rows of access Matrix, H2:0,1Zp.

Challenger randomly chooses μ0,1, a,b,cZp.

LetA,B,C,Z=ga,gb,gc,e^g,gabcifμ=0A,B,C,Z=ga,gb,gc,e^g,gzifμ=1

The aim of simulator is to output a value μ as a conjecture of μ.

The simulator simulates the role of Challenger and runs Adversary’s algorithm as subprogram.

Phase 2 Queries:

Adversary asks for private key for attributes Ai. Simulator picks u,y,aiZp and makes the following settings:

Dr,1,Dr,2,Dr,3=gu+αiH1i,gab+u,e^g,gu,ifAiγgu+αiH1i,gy+u,e^g,gu,ifAiγ 6

The queries like Phase 2 can be asked by Adversary for a bounded times.

Phase 3 Challenge:

Adversary picks plaintext M0, M1 and a challenging LSSS containing attribute set γ.

Simulator chooses μ0,1 and calculates CTμ=SigncryptPK,Mμ,Ds.

Simulator sends CTσ to Adversary.

CTμ:C0=Me^g,gabx,C1=gx,C2,i=e^g,g-αiH1j·λi,C3,i=gλi

Let x=c, accoding to the previous setting in the Setup phase:

CTμ=Me^g,gabc,ifμ=0Me^g,gz,ifμ=1 7

Adversary outputs a value μ as a guess of μ. If μ=μAdversary wins the game.

Then we will discuss simulator’s advantage in distinguishing the following two tuples A=ga,B=gb,C=gc,e^g,gabc and A=ga,B=gb,C=gc,e^g,gz.

When μ=1, E is a illegal ciphertext and Adversary cannot acquire useful information of σ.

Prμμ|μ=1=12 8

Since when μμ, the simulator outputs μ=1, so:

Prμ=μ|μ=1=12 9

When μ=0, E is a legal ciphertext. According to the assumption, Adversary has an advantage ε.

Prμ=μ|μ=1=12+ε 10

Since when μ=μ the simulator outputs μ=1, so

Prμ=μ|μ=0=12+ε 11

As is mentioned above, the advantage of simulator is

12Prμ=μ|μ=0+12Prμ=μ|μ=1-12=1212+ε+12×12-12=ε2 12

Unforgeability

Theorem 2 If anAdversary can break our scheme chosen message attack in the selective model, then it can be constructed that a simulator with a non- negligible advantage solves the DBDH problem.

Proof In the challenge game, if there exists an Adversary which has advantage ε in forging a legal ciphertext, there exists a simulator which can solve the DBDH problem with an advantage of ε/2.

Phase 1 Setup:

Adversary claims a challenging attribute set γ. Challenger defines a set of attributes Ai; Let G1 and G2 be two cyclic groups of prime order p, while g is the generator of G1. Let e^:G1×G1G2 be a bilinear pairing. Define 2 functions: H1 associates attributes to rows of access Matrix,H2:0,1Zp.

Challenger randomly chooses b0,1, a,b,cZp.

LetA,B,C,Z=ga,gb,gc,e^g,gabcifμ=0A,B,C,Z=ga,gb,gc,e^g,gzifμ=1

The aim of simulator is to output a value μ as a conjecture of μ.

Phase 2 Queries:

Privatekeygenerationquery:Adversary chooses a set of attributes Aj, a plaintext M and a LSSS. Simulator picks u,y,ai,bi,yiZp and makes the following settings:

Ds,1,Ds,2,Ds,3=gu+αibiH1i,gab+u,e^g,gu,ifAjγgu+yiH1i,gy+u,e^g,gu,ifAjγ 13

Signcryptquery: Adversary picks a message M for signcrypt query. Simulator runs algorithm SigncryptM,Ds,PK and returns the result CT={U,V,E} to Adversary.

The queries like Phase 2 can be asked by Adversary for a bounded times.

Phase 3 Challenge:

Adversary outputs a ciphertext CT{U,V,E}. Adversary makes the forges the illegal ciphertext as the following process:

U=e^g,gaibiH1j·x,Ajγe^g,gyiH1i·x,Ajγ
t=H2U||M
V=v1,v2=gαjbjH1j+u·x+t,e^g,gu·x+t,AjγgyjH1j+u·x+t,e^g,gu·x+t,Ajγ
E:C0=Me^g,gabx,C1=gx,C2,i=e^g,g-αiH1j·λi,C3,i=gλi 14

Simulator verifies the ciphertext CTU,V,E. Simulator firstly calculates the legal private key of receivers’ attribute set Ai:

{Ds,1,Ds,2}=gajbjH1j+u,gab+u,AjγgyjH1j+u,gy+u,Ajγ 15

Then decrypts and verifies:

M=C0ile^C3,Dr,1)·C2,iωi·e^C1,Dr,2),
t=H2U||M
e^v1,g=e^g(ajbjH1j+u)x+t,g,Ajγe^g(yjH1j+u)x+t,g,Ajγ=e^g,gαjbjH1j·x·e^g,gαjbjH1j·t·e^g,gux+t,Ajγe^g,gyjH1j·x·e^g,gyjH1j·t·e^g,gux+t,Ajγ 16

Let f=e^g,gαjbjH1j·t+ux+t,gH1j·x=gc, according to the previous setting in the Setup phase:

e^v1,g=f·v2·e^g,gabc,ifu=0f·v2·e^g,gz,ifu=1 17

When μ=1, e^v1,g is a random number and Adversary fails to forge a legal ciphertext.

Prμ=μ|μ=1=12 18

When μ=0, E is a legal ciphertext and Adversary successfully forges the ciphertext. According to the assumption, Adversary has an advantage ε.

Prμ=μ|μ=0=12+ε 19

As is mentioned above, the advantage of simulator is

12Prμ=μ|μ=0+12Prμ=μ|μ=1-12=1212+ε+12×12-12=ε2 20

Efficiency analysis

In this paper, we compare the proposed scheme with Wang’s and Hu’s schemes with respect to the computation cost and access control method. Due to the fact that the computation cost of add operation and multiply operation is much smaller than that of exponential operation and bilinear pairing operation, consequently, we mainly compare the number of exponential operation and bilinear pairing operation in different schemes. We denote “Exp” and “Pair” by exponential operation and bilinear pairings. Detailed results are listed in Table 1.

Table 1.

Performance comparison

Schemes Access control method Signcryption computation cost De-signcryption computation cost
Wang and Huang (2011) Access tree 2 Exp + 1Pair (1 + 2nlog n)Exp + (4n + 1)Pair
Hu and Zhang (2013) Threshold (2n + 5) Exp 2n Exp + (3n + 2)Pair
Our scheme LSSS matrix (5n + 2) Exp (n + 1) Exp + (2n + 1)Pair

From Table 1, we can figure out that the number of exponential operation in the signcryption in our CP-ABSC is more than those in Wang and Huang (2011) and Hu and Zhang (2013), however, the number of bilinear pairing operation in the de-signcryption is decreased greatly. Since the computation burden of bilinear pairing operation is heavier than that of exponential operation, the total computation cost has been reduced in our scheme. What’s more, our CP-ABSC adopts LSSS to realize data access control, which differs from the access structures in Wang and Huang (2011 and Hu and Zhang (2013). The LSSS access structure not only avoids the frequent calls of recursive algorithm used in access tree structure model, but also provides more flexible control management and increases the overall efficiency of the cryptosystem.

Conclusion

In this paper, we propose an optimized attribute based signcryption scheme. By security analysis, we prove that it meets the security demands of confidentiality, unforgeability and non-repudiation. Besides, by introducing LSSS structure to implement the access control function, the flexibility and efficiency of the whole attributed based signcryption system has been improved.

Our future work should focus on the attribute revocation and key refreshing in the attribute based encryption. Since users with the same set of attributes share the same private key, once a single user’s private key has been leaked, a group of users’ privacy and privilege will be damaged. Consequently, protecting users’ privacy and refreshing private keys at a lower cost when private key leakage happens is a problem urgently to be solved and should be taken into our future research direction.

Authors’ contributions

HH: Carried out the attribute based signcryption studies, participated in the design of scheme and drafted the manuscript. ZS: Participated in the performance analysis of the scheme. Both authors read and approved the final manuscript.

Authors’ information

Dr. Zhixin Sun is the dean of Internet of Things institute, Nanjing University of Posts and Telecommunications. He has published more than 50 literatures on journals worldwide. His research area includes information security, computer networks, computer science, etc. Dr. Hanshu Hong is a PHD candidate in Nanjing University of Posts and Telecommunications. His research area includes information security, cryptology.

Acknowledgements

This research is supported by the National Natural Science Foundation of China (60973140, 61170276, 61373135). The authors thank the sponsors for their support and the reviewers for helpful comments.

Competing interests

The authors declare that they have no competing financial interests.

Contributor Information

Hanshu Hong, Email: 2014070244@njupt.edu.cn.

Zhixin Sun, Email: sunzx@njupt.edu.cn.

References

  1. Beimel A (1996) Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel
  2. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: Proceedings of the 2007 IEEE symposium on security and privacy. Washington: IEEE Computer Society, pp 321–334
  3. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute based encryption for fine-grained access control of encrypted data. In: ACM conference on computer and communications security, pp 89–98
  4. Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. In: Proceedings of the 35th international colloquium, pp 579–591, Reykjavik, Iceland, 2008
  5. Guo SQ, Zeng YP (2008) Attribute based signature scheme. In: International conference on information security and assurance, pp 509–511
  6. Hu C, Zhang N. Body area network security: a fuzzy attribute based signcryption scheme. IEEE J Sel Areas Commun Suppl. 2013;31(9):37–46. doi: 10.1109/JSAC.2013.SUP.0513004. [DOI] [Google Scholar]
  7. Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute based encryption and (hierarchical) inner product encryption. In: Advances in cryptology—EUROCRYPT 2010, pp 62–91, Springer, Berlin, Germany, 2010
  8. Li F, Khan MK. A biometric identity-based signcryption scheme. Future Gener Comput Syst. 2012;28(1):306–310. doi: 10.1016/j.future.2010.11.004. [DOI] [Google Scholar]
  9. Lim CH, Lee PJ (1998) A study on the proposed Korean digital signature algorithm. In: Advanced in cryptology—ASIACRYPT’98, pp 175–185
  10. Maji H, Prabhakaran M, Rosulek M (2011) Attribute based signatures. In: CT-RSA 2011, pp 376–392, Springer
  11. Paulo SLM, Barreto BL, McCullagh N, Quisquater J-J. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. Adv Cryptol ASIACRYPT LNCS. 2005;3788:515–532. [Google Scholar]
  12. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of the international conference on EUROCRYPT 2005, pp 457–473, Aarhus, Denmark
  13. Selvi S, Vivek S, Shukla D, Chandrasekaran P (2008) Efficient and provably secure certificateless multi-receiver signcryption. ProvSec 5324:52–67
  14. Tan C (2008) On the security of provably secure multi-receiver ID-based signcryption scheme. IEICE transactions on fundamentals of electronics. Commun Comput Sci E91-A(7):1836–1838
  15. Tian Y, Peng Y (2014) An attribute based encryption scheme with revocation for fine-grained access control in wireless body area networks. Int J Distrib Sens Netw 2014:9, Article ID 259798
  16. Wang C, Huang J (2011) Attribute based signcryption with ciphertext policy and claim predicate mechanism. In: CIS, 2011 Seventh international conference, pp 905–909
  17. Waters B (2011) Ciphertext policy attribute based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of International Conference on PKC 2011, pp 53–70, Taormina, Italy, March 2011
  18. Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption). In: CRYPTO 1997, pp 165–179, Springer

Articles from SpringerPlus are provided here courtesy of Springer-Verlag

RESOURCES