© The Institution of Engineering and Technology
In this study, the authors propose a new efficient attribute-based signature (ABS) scheme. This scheme achieves existential unforgeability against selective predicate attack and attributes signer privacy in the standard model. The signature scheme only needs three pairing operations, and the signature size is constant, regardless of the number of attributes. Compared with other existing schemes, this construction provides better efficiency in terms of the computational cost and communication cost. To the best of author's knowledge, this is the first ABS scheme that can achieve constant signature size and constant number of pairing operations. In addition, after the analysis of Wang and Chen's attribute-based ring signature scheme, the authors show that their scheme is incorrect.
References
-
-
1)
-
W. Wang ,
S. Chen
.
Attribute-based ring signature scheme with constant-size signature.
IET Inf. Secur.
,
2 ,
104 -
110
-
2)
-
Waters, B.: `Efficient identity-based encryption without random oracles', Proc. Int. Conf. EUROCRYPT 2005, May 2005, Aarhus, Denmark, p. 114–127, (LNCS, 3494).
-
3)
-
Groth, J., Sahai, A.: `Efficient non-interactive proof systems for bilinear groups', Proc. Int. Conf. EUROCRYPT 2008, April 2008, Istanbul, Turkey, p. 415–432, (LNCS, 4965).
-
4)
-
J. Li ,
K. Kim
.
Hidden attribute-based signatures without anonymity revocation.
Inf. Sci.
,
1681 -
1689
-
5)
-
Birkett, J., Stebila, D.: `Predicate-based key exchange', Proc. Int. Conf. on ACISP 2010, July 2010, Sydney, Australia, p. 282–299, (LNCS, 6168).
-
6)
-
Herranz, J., Laguillaumie, F., Rafols, C.: `Constant size ciphertexts in threshold attribute-based encryption', Proc. Int. Conf. on PKC 2010, May 2010, Paris, France, p. 19–34, (LNCS, 6056).
-
7)
-
R. Steinwandt ,
A. Corona
.
Attribute-based group key establishment.
Adv. Math. Commun.
,
4 ,
381 -
398
-
8)
-
Au, M., Liu, K., Yuen, T.: `ID-based ring signature scheme secure in the standard model', Proc. Int. Conf. IWSEC 2006, October 2006, Kyoto, Japan, p. 1–16, (LNCS, 4266).
-
9)
-
Okamoto, T., Takashima, K.: `Efficient attribute based signatures for non-monotone predicates in the standard model', Proc. Int. Conf. PKC 2011, March 2011, Taormina, Italy, p. 35–52, (LNCS, 6571).
-
10)
-
Waters, B.: `Ciphertext policy attribute based encryption: an expressive, efficient, and provably secure realization', Proc. Int. Conf. PKC 2011, March 2011, Taormina, Italy, p. 53–70, (LNCS, 6571).
-
11)
-
Bethencourt, J., Sahai, A., Waters, B.: `Ciphertext-policy attribute-based encryption', Proc. IEEE Symp. Security and Privacy, 2007, Washington, DC, USA, p. 321–334.
-
12)
-
Attrapadung, N., Libert, B., Panafieu, E.: `Expressive key policy attribute based encryption with constant size ciphertexts', Proc. Int. Conf. PKC 2011, March 2011, Taormina, Italy, p. 90–108, (LNCS, 6571).
-
13)
-
Sahai, A., Waters, B.: `Fuzzy identity-based encryption', Proc. Int. Conf. EUROCRYPT 2005, May 2005, Aarhus, Denmark, p. 457–473, (LNCS, 3494).
-
14)
-
Boneh, D., Boyen, X., Goh, E.: `Hierarchical identity based encryption with constant size ciphertext', Proc. Int. Conf. EUROCRYPT 2005, May 2005, Aarhus, Denmark, p. 440–456, (LNCS, 3494).
-
15)
-
Li, J., Au, M., Susio, W.: `Attribute-based signature and its applications', Proc. Int. Conf. ASIACCS 2010, April 2010, Beijing, China, p. 60–69.
-
16)
-
Escala, A., Herranz, J., Morillo, P.: `Revocable attribute based signatures with adaptive security in the standard model', Proc. Int. Conf. on AFRICACRYPT 2011, July 2011, Dakar, Senegal, p. 224–241, (LNCS, 6737).
-
17)
-
Okamoto, T., Takashima, K.: `Fully secure functional encryption with general relations from the decisional linear assumption', Proc. Int. Conf. CRYPTO 2010, August 2010, Santa Barbara, California, USA, p. 191–208, (LNCS, 6223).
-
18)
-
Shahandashti, S., Safavi-Naini, R.: `Threshold attribute-based signature and their application to anonymous credential systems', Proc. Int. Conf. AFRICACRYPT 2009, June 2009, Gammarth, Tunisia, p. 198–216, (LNCS, 5580).
-
19)
-
Lewko, A., Okamato, T., Sahai, A., Takashima, K.: `Fully secure function encryption: attribute-based encryption and (hierarchical) inner product encryption', Proc. Int. Conf. EUROCRYPT 2010, May 2010, Riviera, French, p. 62–91, (LNCS, 6110).
-
20)
-
Maji, H., Prabhakaran, M., Rosulek, M.: `Attribute-based signature: achieving attribute privacy and collusion-resistance', Proc. Int. Conf. CT-RSA 2011, February 2011, San Francisco, USA, p. 376–392, (LNCS, 6558), The first version available at http://eprint.iacr.org/2008/328, accessed July 2008.
-
21)
-
R. Bobba ,
O. Fatemieh ,
F. Khan
.
Attribute-based messaging: access control and confidentiality.
ACM Trans. Inf. Syst. Secur.
,
4 ,
1 -
35
-
22)
-
Goyal, V., Pandey, O., Sahai, A.: `Attribute-based encryption for fine-grained access control of encrypted data', Proc. 13th ACM Conf. Computer and Communications Security, October 2006, Alexandria, VA, USA, p. 89–98.
-
23)
-
Choudary, M., Boyd, C., Nieto, J.: `Attribute-based authenticated key exchange', Proc. Int. Conf. ACISP 2010, July 2010, Sydney, Australia, p. 300–317, (LNCS, 6168).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2011.0094
Related content
content/journals/10.1049/iet-ifs.2011.0094
pub_keyword,iet_inspecKeyword,pub_concept
6
6