Traceable constant-size multi-authority credentials

被引:3
|
作者
Hebant, Chloe [1 ]
Pointcheval, David [2 ]
机构
[1] Cosmian, Paris, France
[2] PSL Univ, Ecole Normale Super, DIENS, CNRS,Inria, Paris, France
关键词
Anonymous credentials; Aggregate signatures; Traceability; ANONYMOUS CREDENTIALS; SIGNATURES; DEFINITIONS;
D O I
10.1016/j.ic.2023.105060
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many attribute-based anonymous credential (ABC) schemes have been proposed, enabling users to anonymously prove possession of attributes. Recent papers introduced constantsize credentials issued by a single credential issuer for showing a subset of attributes. However, proving possession of attributes from multiple issuers typically requires independent credentials. Only aggregate signature-based attribute-based credential schemes can overcome this limitation. This paper presents new ABC schemes using aggregate signatures with randomizable tags. The schemes consider malicious credential issuers, adaptive corruptions, and collusions with malicious users. While our constructions only support selective attribute disclosures to remain compact, our approach significantly improves the complexity in time and memory for showing multiple attributes. For the first time, the cost for the prover becomes (almost) independent of the number of attributes and issuers. Whereas anonymous credentials require privacy of the user, we also propose the first schemes allowing traceability by a specific tracing authority. & COPY; 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:22
相关论文
共 50 条
  • [31] Lower Bound for Constant-Size Local Certification
    Martinez, Virgina Ardevol
    Caoduro, Marco
    Feuilloley, Laurent
    Narboni, Jonathan
    Pournajafi, Pegah
    Raymond, Jean-Florent
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS (SSS 2022), 2022, 13751 : 239 - 253
  • [32] On the Security of a Constant-Size Group Signature Scheme
    Zhang, Jianhong
    Zou, Jiancheng
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 212 - 215
  • [33] Revocable Decentralized Multi-Authority Functional Encryption
    Tsuchida, Hikaru
    Nishide, Takashi
    Okamoto, Eiji
    Kim, Kwangjo
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 248 - 265
  • [34] Truly Multi-authority 'Pret-a-Voter'
    Haines, Thomas
    Boyen, Xavier
    ELECTRONIC VOTING, E-VOTE-ID 2016, 2017, 10141 : 56 - 72
  • [35] A lower bound for constant-size local certification
    Martinez, Virginia Ardevol
    Caoduro, Marco
    Feuilloley, Laurent
    Narboni, Jonathan
    Pournajafi, Pegah
    Raymond, Jean-Florent
    THEORETICAL COMPUTER SCIENCE, 2023, 971
  • [36] Constant-size dynamic k-TAA
    Au, Man Ho
    Susilo, Willy
    Mu, Yi
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 111 - 125
  • [37] Fully Adaptive Decentralized Multi-Authority ABE
    Datta, Pratish
    Komargodski, Ilan
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 447 - 478
  • [38] A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain
    Zhang, Xiaohong
    Du, Wenqi
    Moshayedi, Ata Jahangir
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 14743 - 14779
  • [39] A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain
    Xiaohong Zhang
    Wenqi Du
    Ata Jahangir Moshayedi
    The Journal of Supercomputing, 2023, 79 : 14743 - 14779
  • [40] RMA-CPABE : A multi-authority CPABE scheme with reduced ciphertext size for IoT devices
    Chaudhary, Chandan Kumar
    Sarma, Richa
    Barbhuiya, Ferdous Ahmed
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 138 : 226 - 242