Traceable constant-size multi-authority credentials

被引:3
|
作者
Hebant, Chloe [1 ]
Pointcheval, David [2 ]
机构
[1] Cosmian, Paris, France
[2] PSL Univ, Ecole Normale Super, DIENS, CNRS,Inria, Paris, France
关键词
Anonymous credentials; Aggregate signatures; Traceability; ANONYMOUS CREDENTIALS; SIGNATURES; DEFINITIONS;
D O I
10.1016/j.ic.2023.105060
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many attribute-based anonymous credential (ABC) schemes have been proposed, enabling users to anonymously prove possession of attributes. Recent papers introduced constantsize credentials issued by a single credential issuer for showing a subset of attributes. However, proving possession of attributes from multiple issuers typically requires independent credentials. Only aggregate signature-based attribute-based credential schemes can overcome this limitation. This paper presents new ABC schemes using aggregate signatures with randomizable tags. The schemes consider malicious credential issuers, adaptive corruptions, and collusions with malicious users. While our constructions only support selective attribute disclosures to remain compact, our approach significantly improves the complexity in time and memory for showing multiple attributes. For the first time, the cost for the prover becomes (almost) independent of the number of attributes and issuers. Whereas anonymous credentials require privacy of the user, we also propose the first schemes allowing traceability by a specific tracing authority. & COPY; 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] Playing Mastermind with Constant-Size Memory
    Doerr, Benjamin
    Winzen, Carola
    THEORY OF COMPUTING SYSTEMS, 2014, 55 (04) : 658 - 684
  • [22] TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size
    Kang, Zhaozhe
    Li, Jiguo
    Shen, Jian
    Han, Jinguang
    Zuo, Yuting
    Zhang, Yichen
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (09) : 9514 - 9530
  • [23] Multi-authority attribute based encryption
    Chase, Melissa
    Theory of Cryptography, Proceedings, 2007, 4392 : 515 - 534
  • [24] Playing Mastermind with Constant-Size Memory
    Benjamin Doerr
    Carola Winzen
    Theory of Computing Systems, 2014, 55 : 658 - 684
  • [25] Practical Constant-Size Ring Signature
    Qin, Meng-Jun
    Zhao, Yun-Lei
    Ma, Zhou-Jun
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (03) : 533 - 541
  • [26] Practical Constant-Size Ring Signature
    Meng-Jun Qin
    Yun-Lei Zhao
    Zhou-Jun Ma
    Journal of Computer Science and Technology, 2018, 33 : 533 - 541
  • [27] Constant-Size Group Signatures from Lattices
    Ling, San
    Khoa Nguyen
    Wang, Huaxiong
    Xu, Yanhong
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 58 - 88
  • [28] Atomos: Constant-Size Path Validation Proof
    He, Anxiao
    Bu, Kai
    Li, Yucong
    Chida, Eikoh
    Gu, Qianping
    Ren, Kui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3832 - 3847
  • [29] Outsourcing decryption of multi-authority ABE ciphertexts
    Li, Keying
    Ma, Hua
    International Journal of Network Security, 2014, 16 (04) : 286 - 294
  • [30] Partially hidden policy multi-authority CP-ABE scheme with constant length ciphertext
    Liu, Yilong
    Xu, Shengwei
    Yue, Ziyan
    Tongxin Xuebao/Journal on Communications, 45 (08): : 20 - 36