loading
Papers

Research.Publish.Connect.

Paper

Authors: Sana Belguith 1 ; Nesrine Kaaniche 2 ; Maryline Laurent 2 ; Abderrazak Jemai 3 and Rabah Attia 1

Affiliations: 1 Laboratory of Electronic Systems and Communication Network and Tunisia Polytechnic School, Tunisia ; 2 SAMOVAR, CNRS, Telecom SudParis and University Paris-Saclay, France ; 3 Laboratory LIP2 and University of Sciences of Tunis, Tunisia

ISBN: 978-989-758-259-2

Keyword(s): Attribute based Signcryption, Public Clouds, Privacy, Confidentiality, Access Control, Anonymous Data Origin Authentication.

Related Ontology Subjects/Areas/Topics: Access Control ; Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Data Protection ; Databases and Data Security ; Information and Systems Security ; Internet Technology ; Security and Privacy in the Cloud ; Web Information Systems and Technologies

Abstract: In this paper, we propose a novel constant-size threshold attribute-based signcryption scheme for securely sharing data through public clouds. Our proposal has several advantages. First, it provides flexible cryptographic access control, while preserving users' privacy as the identifying information for satisfying the access control policy are not revealed. Second, the proposed scheme guarantees both data origin authentication and anonymity thanks to the novel use of attribute based signcryption mechanism, while ensuring the unlinkability between the different access sessions. Third, the proposed signcryption scheme has efficient computation cost and constant communication overhead whatever the number of involved attributes. Finally, our scheme satisfies strong security properties in the random oracle model, namely Indistinguishability against the Adaptive Chosen Ciphertext Attacks (IND-CCA2), Existential Unforgeability against Chosen Message Attacks (EUF-CMA) and privacy preservati on of the attributes involved in the signcryption process, based on the assumption that the augmented Multi-Sequence of Exponents Decisional Diffie-Hellman (aMSE-DDH) problem and the Computational Diffie Hellman Assumption (CDH) are hard. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 100.24.122.228

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Belguith, S.; Kaaniche, N.; Laurent, M.; Jemai, A. and Attia, R. (2017). Constant-size Threshold Attribute based SignCryption for Cloud Applications.In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017) ISBN 978-989-758-259-2, pages 212-225. DOI: 10.5220/0006469202120225

@conference{secrypt17,
author={Sana Belguith. and Nesrine Kaaniche. and Maryline Laurent. and Abderrazak Jemai. and Rabah Attia.},
title={Constant-size Threshold Attribute based SignCryption for Cloud Applications},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)},
year={2017},
pages={212-225},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006469202120225},
isbn={978-989-758-259-2},
}

TY - CONF

JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)
TI - Constant-size Threshold Attribute based SignCryption for Cloud Applications
SN - 978-989-758-259-2
AU - Belguith, S.
AU - Kaaniche, N.
AU - Laurent, M.
AU - Jemai, A.
AU - Attia, R.
PY - 2017
SP - 212
EP - 225
DO - 10.5220/0006469202120225

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.