×

zbMATH — the first resource for mathematics

Efficient and secure attribute-based signature for monotone predicates. (English) Zbl 1377.94050
Summary: Attribute-based signature (ABS) is a novel cryptographic primitive, which can make the signing party sign a message with fine-grained control over identifying information. ABS only reveals the fact that the verified message must be signed by a user with a set of attributes satisfying a predicate. Thus, ABS can hide any identifying information and make fine-grained control on signing. Presently, many attribute-based signature schemes have been proposed, but most of them are not very efficient. Maji et al. recently presented a complete definition and construction about ABS for monotone predicates and showed three instantiations under their framework for ABS. Although the most practical one of their instantiations is efficient, the instantiation is constructed in the generic group model and has been proved to be insecure. Then, Okamoto et al. proposed an attribute-based signature scheme in the standard model, which can support generalized non-monotone predicates over access structure. However, their scheme is not efficient in practice. In this paper, we present a framework for ABS and show a detailed security model for ABS. Under our framework, we present an attribute-based signature scheme for monotone predicates in the standard model, where we choose the Waters’ signature scheme as the prototype of our attribute-based signature scheme. Compared with the Maji’s scheme in the generic group model, the proposed scheme is constructed in the standard model. Furthermore, compared with the Okamoto’s scheme, the proposed scheme is more efficient by decreasing the computation cost.

MSC:
94A60 Cryptography
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] Bender, A; Katz, J; Morselli, R, Ring signatures: stronger definitions, and constructions without random oracles, J. Cryptol., 22, 114-138, (2009) · Zbl 1163.94431
[2] Boyen, X.: Mesh signatures. Advances in Cryptology-EUROCRYPT 2007. LNCS 4515, Springer-Verlag, pp. 210-227 ( 2007) · Zbl 1141.94342
[3] Bethencourt, J., Sahai, A., Warters, B.: Ciphertext-Policy Attribute-Based Encryption. In: Proceedings of IEEE Symposium on Security and Privacy, ACM, pp. 321-334 (2007)
[4] Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution, PhD Thesis, Israel Institute of Technology, Haifa, Israel (1996)
[5] Boneh, D., Boyen, X.: Short signatures without random oracles. Advances in Cryptology-EUROCRYPT 2004. LNCS 3027, Springer-Verlag, pp.56-73 (2004) · Zbl 1122.94354
[6] Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. Advances in Cryptology-CRYPTO 2009, LNCS 5677, Springer-Verlag, pp. 108-125 (2009) · Zbl 1252.94047
[7] Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. TCC 2008, LNCS 4948, Springer-Verlag, pp. 356-374 (2008) · Zbl 1162.94338
[8] Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. PhD Thesis, Israel Institute of Technology, Haifa, Israel (1996)
[9] Chen, C., Chen, J., Lim, H.W., Zhang, Z.F., Feng, D.G., Ling, S., Wang, H.X.: Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. RSA 2013, LNCS 7779, Springer-Verlag, pp. 50-67 (2013) · Zbl 1312.94039
[10] Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, ACM, pp. 456-465 (2007)
[11] Gu, J.: An efficient and practicable anonymous authentication scheme using smart cards. Information Theory and Information Security 2010 (ICITIS 2010), IEEE Computer Society, pp. 470-473 (2010)
[12] Goyal, V., Pandey, O., Sahai, A., Warters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM, pp. 89-98 (2006)
[13] Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute-based encryption. In: Proceedings of the 35th International Colloquium on Automata, Languages and Programming. LNCS 5126, Springer-Verlag, pp. 579-591 (2008) · Zbl 1155.94369
[14] Guo, S., Zeng, Y.: Attribute-based signature scheme. In: International Conference on Information Security and Assurance 2008, IEEE Computer Society, pp. 509-511 (2008)
[15] Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. Advances in Cryptology-EUROCRYPT 2008, LNCS 4965, Springer-Verlag, pp. 415-432 (2008) · Zbl 1149.94320
[16] Herranz, J., Laguillaumie, F., Libert, B., Rfols, C.: Short attribute-based signatures for threshold predicates. CT-RSA 2012, LNCS 7178, Springer-Verlag, pp. 51-67 (2012) · Zbl 1292.94075
[17] Karchmer, M., Wigderson, A.: On span programs. In: Proceedings of the 8th IEEE Structure in Complexity Theory conference, San Diego, IEEE Computer Society Press, pp. 102-111 (1993)
[18] Khader, D.: Attribute based group signature with revocation. Cryptology ePrint Archive, Report 2007/241 (2007). http://eprint.iacr.org/2007/241
[19] Khader, D.: Attribute based group signatures. Cryptology ePrint Archive, Report 2007/159 (2007). http://eprint.iacr.org/2007/159
[20] Libert, B., Peters, T., Yung, M.: Scalable group signatures with revocation. Advances in Cryptology-EUROCRYPT 2012, LNCS 7323, Springer-Verlag, pp. 609-627 (2012) · Zbl 1296.94155
[21] Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based signature and its applications. ASIACCS 2010, ACM, pp. 60-69 (2010)
[22] Li, J., Kim, K.: Attribute-based ring signatures. Cryptology ePrint Archive, Report 2008/394 (2008). http://eprint.iacr.org/2008/394
[23] Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. Topics in Cryptology-CT-RSA 2011, LNCS 6558, Springer-Verlag, pp. 376-392 (2011) · Zbl 1284.94093
[24] Okamoto, T., Takashima, K., Signatures, efficient attribute-based, for non-monotone predicates in the standard model. Public Key Cryptography-PKC: LNCS 6571. Springer-Verlag, pp. 35-52 (2011) · Zbl 1291.94194
[25] Sahai, A., Warters, B.: Fuzzy identity-based encryption. Advances in Cryptology-EUROCRYPT 2005, LNCS 3494, Springer-Verlag, pp. 457-473 (2005) · Zbl 1137.94355
[26] Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. Advances in Cryptology-AFRICACRYPT 2009, LNCS 5580, Springer-Verlag, pp. 198-216 (2009) · Zbl 1246.94048
[27] Waters, B.: Efficient identity-based encryption without random oracles. Advances in Cryptology-EUROCRYPT 2005, LNCS 3494, Springer-Verlag, pp. 114-127 (2005) · Zbl 1137.94360
[28] Zhang, Y., Feng, D.G., Zhang, Z.F., Zhang, L.W.: On the security of an efficient attribute-based signature. NSS 2013, LNCS 7873, Springer-Verlag, pp. 381-392 (2013)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.