http://iet.metastore.ingenta.com
1887

Attribute-based signature scheme with constant size signature in the standard model

Attribute-based signature scheme with constant size signature in the standard model

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this study, the authors propose a new efficient attribute-based signature (ABS) scheme. This scheme achieves existential unforgeability against selective predicate attack and attributes signer privacy in the standard model. The signature scheme only needs three pairing operations, and the signature size is constant, regardless of the number of attributes. Compared with other existing schemes, this construction provides better efficiency in terms of the computational cost and communication cost. To the best of author's knowledge, this is the first ABS scheme that can achieve constant signature size and constant number of pairing operations. In addition, after the analysis of Wang and Chen's attribute-based ring signature scheme, the authors show that their scheme is incorrect.

References

    1. 1)
      • Sahai, A., Waters, B.: `Fuzzy identity-based encryption', Proc. Int. Conf. EUROCRYPT 2005, May 2005, Aarhus, Denmark, p. 457–473, (LNCS, 3494).
    2. 2)
      • Attrapadung, N., Libert, B., Panafieu, E.: `Expressive key policy attribute based encryption with constant size ciphertexts', Proc. Int. Conf. PKC 2011, March 2011, Taormina, Italy, p. 90–108, (LNCS, 6571).
    3. 3)
      • Bethencourt, J., Sahai, A., Waters, B.: `Ciphertext-policy attribute-based encryption', Proc. IEEE Symp. Security and Privacy, 2007, Washington, DC, USA, p. 321–334.
    4. 4)
      • Goyal, V., Pandey, O., Sahai, A.: `Attribute-based encryption for fine-grained access control of encrypted data', Proc. 13th ACM Conf. Computer and Communications Security, October 2006, Alexandria, VA, USA, p. 89–98.
    5. 5)
      • Herranz, J., Laguillaumie, F., Rafols, C.: `Constant size ciphertexts in threshold attribute-based encryption', Proc. Int. Conf. on PKC 2010, May 2010, Paris, France, p. 19–34, (LNCS, 6056).
    6. 6)
      • Lewko, A., Okamato, T., Sahai, A., Takashima, K.: `Fully secure function encryption: attribute-based encryption and (hierarchical) inner product encryption', Proc. Int. Conf. EUROCRYPT 2010, May 2010, Riviera, French, p. 62–91, (LNCS, 6110).
    7. 7)
      • Waters, B.: `Ciphertext policy attribute based encryption: an expressive, efficient, and provably secure realization', Proc. Int. Conf. PKC 2011, March 2011, Taormina, Italy, p. 53–70, (LNCS, 6571).
    8. 8)
      • Escala, A., Herranz, J., Morillo, P.: `Revocable attribute based signatures with adaptive security in the standard model', Proc. Int. Conf. on AFRICACRYPT 2011, July 2011, Dakar, Senegal, p. 224–241, (LNCS, 6737).
    9. 9)
      • Li, J., Au, M., Susio, W.: `Attribute-based signature and its applications', Proc. Int. Conf. ASIACCS 2010, April 2010, Beijing, China, p. 60–69.
    10. 10)
    11. 11)
      • Maji, H., Prabhakaran, M., Rosulek, M.: `Attribute-based signature: achieving attribute privacy and collusion-resistance', Proc. Int. Conf. CT-RSA 2011, February 2011, San Francisco, USA, p. 376–392, (LNCS, 6558), The first version available at http://eprint.iacr.org/2008/328, accessed July 2008.
    12. 12)
      • Okamoto, T., Takashima, K.: `Efficient attribute based signatures for non-monotone predicates in the standard model', Proc. Int. Conf. PKC 2011, March 2011, Taormina, Italy, p. 35–52, (LNCS, 6571).
    13. 13)
      • Shahandashti, S., Safavi-Naini, R.: `Threshold attribute-based signature and their application to anonymous credential systems', Proc. Int. Conf. AFRICACRYPT 2009, June 2009, Gammarth, Tunisia, p. 198–216, (LNCS, 5580).
    14. 14)
      • Birkett, J., Stebila, D.: `Predicate-based key exchange', Proc. Int. Conf. on ACISP 2010, July 2010, Sydney, Australia, p. 282–299, (LNCS, 6168).
    15. 15)
      • Choudary, M., Boyd, C., Nieto, J.: `Attribute-based authenticated key exchange', Proc. Int. Conf. ACISP 2010, July 2010, Sydney, Australia, p. 300–317, (LNCS, 6168).
    16. 16)
    17. 17)
    18. 18)
      • Okamoto, T., Takashima, K.: `Fully secure functional encryption with general relations from the decisional linear assumption', Proc. Int. Conf. CRYPTO 2010, August 2010, Santa Barbara, California, USA, p. 191–208, (LNCS, 6223).
    19. 19)
      • Boneh, D., Boyen, X., Goh, E.: `Hierarchical identity based encryption with constant size ciphertext', Proc. Int. Conf. EUROCRYPT 2005, May 2005, Aarhus, Denmark, p. 440–456, (LNCS, 3494).
    20. 20)
      • Au, M., Liu, K., Yuen, T.: `ID-based ring signature scheme secure in the standard model', Proc. Int. Conf. IWSEC 2006, October 2006, Kyoto, Japan, p. 1–16, (LNCS, 4266).
    21. 21)
    22. 22)
      • Waters, B.: `Efficient identity-based encryption without random oracles', Proc. Int. Conf. EUROCRYPT 2005, May 2005, Aarhus, Denmark, p. 114–127, (LNCS, 3494).
    23. 23)
      • Groth, J., Sahai, A.: `Efficient non-interactive proof systems for bilinear groups', Proc. Int. Conf. EUROCRYPT 2008, April 2008, Istanbul, Turkey, p. 415–432, (LNCS, 4965).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2011.0094
Loading

Related content

content/journals/10.1049/iet-ifs.2011.0094
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address