An attribute-based signcryption scheme to secure attribute-defined multicast communications

28Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We consider a special type of multicast communications existing in many emerging applications such as smart grids, social networks, and body area networks, in which the multicast destinations are specified by an access structure defined by the data source based on a set of attributes and carried by the multicast message. A challenging issue is to secure these multicast communications to address the prevalent security and privacy concerns, i.e., to provide access control, data encryption, and authentication to ensure message integrity and confidentiality. To achieve this objective, we present a signcryption scheme called CP _ABSC based on Ciphertext-Policy Attribute Based Encryption (CP _ABE) [2] in this paper. CP _ABSC provides algorithms for key management, signcryption, and designcryption. It can be used to signcrypt a message/data based on the access rights specified by the message/data itself. A multicast destination can designcrypt a ciphertext if and only if it possesses the attributes required by the access structure of the data. Thus CP _ABSC effectively defines a multicast group based on the access rights of the data. CP _ABSC provides collusion attack resistance, message authentication, forgery prevention, and confidentiality. It can be easily applied to secure push-based multicasts where the data is pushed from the source to multiple destinations and pull-based multicasts where the data is downloaded from a repository by multiple destinations. Compared to CP _ABE, CP _ABSC combines encryption with signature at a lower computational cost for signcryption and a slightly higher cost in designcryption for signature verification.

Cite

CITATION STYLE

APA

Hu, C., Cheng, X., Tian, Z., Yu, J., Akkaya, K., & Sun, L. (2015). An attribute-based signcryption scheme to secure attribute-defined multicast communications. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 164, pp. 418–437). Springer Verlag. https://doi.org/10.1007/978-3-319-28865-9_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free