efficient multiauthority attribute based signcryption

kiruthiga.M,suvetha.A.R,swetha.v,sathya.s

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 21 April,2023         Pages:1731-1736

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Efficient multi-authority attribute-based signcryption (EMABSC) is a cryptographic technique that allows multiple authorities to collaborate in encrypting and signing messages based on certain attributes. In this paper, we propose an improved EMABSC scheme that enhances the security and efficiency of the existing approaches. Our scheme employs a hybrid encryption and signature mechanism to provide confidentiality, integrity, and authenticity of the signed and encrypted messages. It also allows multiple authorities to independently generate partial signatures and encrypt parts of the message based on specific attributes, without revealing any information to each other. To improve the efficiency of the proposed scheme, we utilize a symmetric encryption algorithm in the encryption process, which reduces the computational cost compared to existing asymmetric encryption-based schemes. We also introduce a threshold mechanism that allows for flexible control of the number of authorities needed to decrypt and verify the signature of a message. We conducted a security analysis of the proposed scheme and proved its correctness and security against various attacks. Our performance evaluation results showed that our scheme outperforms existing EMABSC schemes in terms of computational efficiency and communication overhead, making it suitable for use in various applications such as e-commerce, e-government, and cloud computing.

Kewords

Attribute Based Signature, Attribute Based Encryption, Attribute-Based Signcryption, Constant-Size Ciphertext, Multi Authority, Cloud Storage, Authentication, Confidentiality.

Reference

[1] L. Wang, Z. Guan, Z. Chen and M. Hu, "Multi-receiver signcryption scheme with multiple key generation centres through public channel in edge computing," in China Communications, vol. 19, no. 4, pp. 177-198, April 2022 [2] Y. Zhao, A. Ruan, G. Dan, J. Huang and Y. Ding, "Efficient Multi-Authority Attribute-based Signcryption with Constant-Size Ciphertext," 2021 IEEE Conference on Dependable and Secure Computing (DSC), 2021 [3] L. Shuquan and Z. Huiqi, "Online/Offline Attribute-Based Encryptioin with Multi-Authority Access Control," 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2021 [4] Y. Ming, B. He and C. Wang, "Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage," in IEEE Access, vol. 9, pp. 42593-42603, 2021 [5] Y. Li et al., "SDABS: A Flexible and Efficient Multi-Authority Hybrid Attribute-Based Signature Scheme in Edge Environment," in IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 3, pp. 1892-1906, March 2021 [6] K. Huang, "Revocable Large Universe Decentralized Multi-Authority Attribute-Based Encryption Without Key Abuse for Cloud-Aided IoT," in IEEE Access,2021. [7] X. Liu, W. Chen, Y. Xia and R. Shen, "TRAMS: A Secure Vehicular Crowdsensing Scheme Based on Multi-Authority Attribute-Based Signature," in IEEE Transactions on Intelligent Transportation Systems 2020. [8] J. Priyanka, K. R. Rajeshwari and M. Ramakrishnan, "Operative Access Regulator for Attribute Based Generalized Signcryption Using Rough Set Theory," 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), 2020. [9] X. Yang, R. Liu, G. Chen, M. Wang and C. Wang, "Security analysis of a certificateless signcryption mechanism without bilinear mapping," 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2020. [10] Q. Xu, C. Tan, Z. Fan, W. 8Zhu, Y. Xiao and F. Cheng, "Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption," in IEEE Access, 2018.