Attribute-based signature scheme with constant size signature in the standard model
Attribute-based signature scheme with constant size signature in the standard model
- Author(s): A.-J. Ge ; C.-G. Ma ; Z.-F. Zhang
- DOI: 10.1049/iet-ifs.2011.0094
For access to this article, please select a purchase option:
Buy article PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Thank you
Your recommendation has been sent to your librarian.
- Author(s): A.-J. Ge 1 ; C.-G. Ma 1 ; Z.-F. Zhang 2
-
-
View affiliations
-
Affiliations:
1: Department of Applied Mathematics, Zhengzhou Information Science and Technology Institute, Zhengzhou, People's Republic of China
2: State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, People's Republic of China
-
Affiliations:
1: Department of Applied Mathematics, Zhengzhou Information Science and Technology Institute, Zhengzhou, People's Republic of China
- Source:
Volume 6, Issue 2,
June 2012,
p.
47 – 54
DOI: 10.1049/iet-ifs.2011.0094 , Print ISSN 1751-8709, Online ISSN 1751-8717
- « Previous Article
- Table of contents
- Next Article »
In this study, the authors propose a new efficient attribute-based signature (ABS) scheme. This scheme achieves existential unforgeability against selective predicate attack and attributes signer privacy in the standard model. The signature scheme only needs three pairing operations, and the signature size is constant, regardless of the number of attributes. Compared with other existing schemes, this construction provides better efficiency in terms of the computational cost and communication cost. To the best of author's knowledge, this is the first ABS scheme that can achieve constant signature size and constant number of pairing operations. In addition, after the analysis of Wang and Chen's attribute-based ring signature scheme, the authors show that their scheme is incorrect.
Inspec keywords: public key cryptography; data privacy; digital signatures
Other keywords:
Subjects: Data security; Cryptography theory; Cryptography
References
-
-
1)
- W. Wang , S. Chen . Attribute-based ring signature scheme with constant-size signature. IET Inf. Secur. , 2 , 104 - 110
-
2)
- Waters, B.: `Efficient identity-based encryption without random oracles', Proc. Int. Conf. EUROCRYPT 2005, May 2005, Aarhus, Denmark, p. 114–127, (LNCS, 3494).
-
3)
- Groth, J., Sahai, A.: `Efficient non-interactive proof systems for bilinear groups', Proc. Int. Conf. EUROCRYPT 2008, April 2008, Istanbul, Turkey, p. 415–432, (LNCS, 4965).
-
4)
- J. Li , K. Kim . Hidden attribute-based signatures without anonymity revocation. Inf. Sci. , 1681 - 1689
-
5)
- Birkett, J., Stebila, D.: `Predicate-based key exchange', Proc. Int. Conf. on ACISP 2010, July 2010, Sydney, Australia, p. 282–299, (LNCS, 6168).
-
6)
- Herranz, J., Laguillaumie, F., Rafols, C.: `Constant size ciphertexts in threshold attribute-based encryption', Proc. Int. Conf. on PKC 2010, May 2010, Paris, France, p. 19–34, (LNCS, 6056).
-
7)
- R. Steinwandt , A. Corona . Attribute-based group key establishment. Adv. Math. Commun. , 4 , 381 - 398
-
8)
- Au, M., Liu, K., Yuen, T.: `ID-based ring signature scheme secure in the standard model', Proc. Int. Conf. IWSEC 2006, October 2006, Kyoto, Japan, p. 1–16, (LNCS, 4266).
-
9)
- Okamoto, T., Takashima, K.: `Efficient attribute based signatures for non-monotone predicates in the standard model', Proc. Int. Conf. PKC 2011, March 2011, Taormina, Italy, p. 35–52, (LNCS, 6571).
-
10)
- Waters, B.: `Ciphertext policy attribute based encryption: an expressive, efficient, and provably secure realization', Proc. Int. Conf. PKC 2011, March 2011, Taormina, Italy, p. 53–70, (LNCS, 6571).
-
11)
- Bethencourt, J., Sahai, A., Waters, B.: `Ciphertext-policy attribute-based encryption', Proc. IEEE Symp. Security and Privacy, 2007, Washington, DC, USA, p. 321–334.
-
12)
- Attrapadung, N., Libert, B., Panafieu, E.: `Expressive key policy attribute based encryption with constant size ciphertexts', Proc. Int. Conf. PKC 2011, March 2011, Taormina, Italy, p. 90–108, (LNCS, 6571).
-
13)
- Sahai, A., Waters, B.: `Fuzzy identity-based encryption', Proc. Int. Conf. EUROCRYPT 2005, May 2005, Aarhus, Denmark, p. 457–473, (LNCS, 3494).
-
14)
- Boneh, D., Boyen, X., Goh, E.: `Hierarchical identity based encryption with constant size ciphertext', Proc. Int. Conf. EUROCRYPT 2005, May 2005, Aarhus, Denmark, p. 440–456, (LNCS, 3494).
-
15)
- Li, J., Au, M., Susio, W.: `Attribute-based signature and its applications', Proc. Int. Conf. ASIACCS 2010, April 2010, Beijing, China, p. 60–69.
-
16)
- Escala, A., Herranz, J., Morillo, P.: `Revocable attribute based signatures with adaptive security in the standard model', Proc. Int. Conf. on AFRICACRYPT 2011, July 2011, Dakar, Senegal, p. 224–241, (LNCS, 6737).
-
17)
- Okamoto, T., Takashima, K.: `Fully secure functional encryption with general relations from the decisional linear assumption', Proc. Int. Conf. CRYPTO 2010, August 2010, Santa Barbara, California, USA, p. 191–208, (LNCS, 6223).
-
18)
- Shahandashti, S., Safavi-Naini, R.: `Threshold attribute-based signature and their application to anonymous credential systems', Proc. Int. Conf. AFRICACRYPT 2009, June 2009, Gammarth, Tunisia, p. 198–216, (LNCS, 5580).
-
19)
- Lewko, A., Okamato, T., Sahai, A., Takashima, K.: `Fully secure function encryption: attribute-based encryption and (hierarchical) inner product encryption', Proc. Int. Conf. EUROCRYPT 2010, May 2010, Riviera, French, p. 62–91, (LNCS, 6110).
-
20)
- Maji, H., Prabhakaran, M., Rosulek, M.: `Attribute-based signature: achieving attribute privacy and collusion-resistance', Proc. Int. Conf. CT-RSA 2011, February 2011, San Francisco, USA, p. 376–392, (LNCS, 6558), The first version available at http://eprint.iacr.org/2008/328, accessed July 2008.
-
21)
- R. Bobba , O. Fatemieh , F. Khan . Attribute-based messaging: access control and confidentiality. ACM Trans. Inf. Syst. Secur. , 4 , 1 - 35
-
22)
- Goyal, V., Pandey, O., Sahai, A.: `Attribute-based encryption for fine-grained access control of encrypted data', Proc. 13th ACM Conf. Computer and Communications Security, October 2006, Alexandria, VA, USA, p. 89–98.
-
23)
- Choudary, M., Boyd, C., Nieto, J.: `Attribute-based authenticated key exchange', Proc. Int. Conf. ACISP 2010, July 2010, Sydney, Australia, p. 300–317, (LNCS, 6168).
-
1)