Privacy Preserving Signcryption Scheme

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10109)


Signcryption is a public-key cryptographic primitive that is a synthesis of encryption and digital signature schemes. We present a signcryption scheme using anonymous attribute based encryption. The scheme uses the notion of identity-based digital signature on the message encrypted under the attribute based encryption scheme. The scheme provides both sender and receiver anonymity, in particular, only the legitimate receiver can identify the sender after the successful decryption operation. We show that the scheme is secure against adaptive chosen ciphertext attack and chosen message attack.


Signcryption Attribute based encryption Identity based signature Anonymity 


  1. 1.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 89–98 (2006)Google Scholar
  2. 2.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 321–334 (2007)Google Scholar
  3. 3.
    Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 456–465 (2007)Google Scholar
  4. 4.
    Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 579–591. Springer, Heidelberg (2008). doi: 10.1007/978-3-540-70583-3_47 CrossRefGoogle Scholar
  5. 5.
    Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-13190-5_4 CrossRefGoogle Scholar
  6. 6.
    Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191–208. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-14623-7_11 CrossRefGoogle Scholar
  7. 7.
    Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 195–203 (2007)Google Scholar
  8. 8.
    Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-19379-8_4 CrossRefGoogle Scholar
  9. 9.
    Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N.: Generic constructions for chosen-ciphertext secure attribute based encryption. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 71–89. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-19379-8_5 CrossRefGoogle Scholar
  10. 10.
    Kapadia, A., Tsang, P.P., Smith, S.W.: Attribute-based publishing with hidden credentials and hidden policies. In: Proceedings of Network and Distributed System Security Symposium, vol. 7, pp. 179–192 (2007)Google Scholar
  11. 11.
    Yu, S., Ren, K., Lou, W.: Attribute-based content distribution with hidden policy. In: Proceedings of Workshop on Secure Network Protocols, pp. 39–44. IEEE (2008)Google Scholar
  12. 12.
    Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111–129. Springer, Heidelberg (2008). doi: 10.1007/978-3-540-68914-0_7 CrossRefGoogle Scholar
  13. 13.
    Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 347–362. Springer, Heidelberg (2009). doi: 10.1007/978-3-642-04474-8_28 CrossRefGoogle Scholar
  14. 14.
    Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H.: Anonymous attribute-based encryption supporting efficient decryption test. In: Proceedings of the ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 511–516 (2013)Google Scholar
  15. 15.
    Chaudhari, P., Das, M.L., Mathuria, A.: On anonymous attribute based encryption. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 378–392. Springer, Heidelberg (2015). doi: 10.1007/978-3-319-26961-0_23 CrossRefGoogle Scholar
  16. 16.
    Rao, Y.S., Dutta, R.: Recipient anonymous ciphertext-policy attribute based encryption. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 329–344. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-45204-8_25 CrossRefGoogle Scholar
  17. 17.
    Zheng, Y.: Digital Signatures or how to achievecost (Signature & Encryption)<< Cost (Signature) +Cost(Encryption). In: Kaliski, B.S. (ed.) Advances in Cryptology - CRYPTO. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  18. 18.
    Malone-Lee, J.: Identity-Based Signcryption. IACR Cryptology eprint Archieve, report 2002/098 (2002)Google Scholar
  19. 19.
    Libert, B., Quisquater, J.J.: New identity based signcryption schemes from pairings. IACR Cryptology ePrint Archive, report 2003/23 (2003)Google Scholar
  20. 20.
    Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362–379. Springer, Heidelberg (2005). doi: 10.1007/978-3-540-30580-4_25 CrossRefGoogle Scholar
  21. 21.
    Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005). doi: 10.1007/11593447_28 CrossRefGoogle Scholar
  22. 22.
    Boyen, X.: Identity-based signcryption. In: Dent, A.W., Zheng, Y. (eds.) Practical Signcryption. Information Security and Cryptography, pp. 195–216. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  23. 23.
    Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based signcryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 195–206. Springer, Heidelberg (2006). doi: 10.1007/11780656_17 CrossRefGoogle Scholar
  24. 24.
    Ming, Y., Zhao, X., Wang, Y.: Multi-receiver identity-based signcryption scheme in the standard model. In: Liu, B., Chai, C. (eds.) ICICA 2011. LNCS, vol. 7030, pp. 487–494. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-25255-6_62 CrossRefGoogle Scholar
  25. 25.
    Pang, L., Gao, L., Li, H., Wang, Y.: Anonymous multi-receiver ID-based signcryption scheme. Inf. Secur. IET 9(3), 194–201 (2015)CrossRefGoogle Scholar
  26. 26.
    Wang, C., Huang, J.: Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism. In: Proceedings of the International Conference on Computational Intelligence and Security, pp. 905–909. IEEE (2011)Google Scholar
  27. 27.
    Gagné, M., Narayan, S., Safavi-Naini, R.: Threshold attribute-based signcryption. In: Garay, J.A., Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 154–171. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-15317-4_11 CrossRefGoogle Scholar
  28. 28.
    Emura, K., Miyaji, A., Rahman, M.S.: Dynamic attribute-based signcryption without random oracles. Int. J. Appl. Cryptogr. 2(3), 199–211 (2012)MathSciNetCrossRefMATHGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.DA-IICTGandhinagarIndia

Personalised recommendations