Traceable constant-size multi-authority credentials

被引:3
|
作者
Hebant, Chloe [1 ]
Pointcheval, David [2 ]
机构
[1] Cosmian, Paris, France
[2] PSL Univ, Ecole Normale Super, DIENS, CNRS,Inria, Paris, France
关键词
Anonymous credentials; Aggregate signatures; Traceability; ANONYMOUS CREDENTIALS; SIGNATURES; DEFINITIONS;
D O I
10.1016/j.ic.2023.105060
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many attribute-based anonymous credential (ABC) schemes have been proposed, enabling users to anonymously prove possession of attributes. Recent papers introduced constantsize credentials issued by a single credential issuer for showing a subset of attributes. However, proving possession of attributes from multiple issuers typically requires independent credentials. Only aggregate signature-based attribute-based credential schemes can overcome this limitation. This paper presents new ABC schemes using aggregate signatures with randomizable tags. The schemes consider malicious credential issuers, adaptive corruptions, and collusions with malicious users. While our constructions only support selective attribute disclosures to remain compact, our approach significantly improves the complexity in time and memory for showing multiple attributes. For the first time, the cost for the prover becomes (almost) independent of the number of attributes and issuers. Whereas anonymous credentials require privacy of the user, we also propose the first schemes allowing traceability by a specific tracing authority. & COPY; 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] A multi-authority approach to various predicate encryption types
    Tim van de Kamp
    Andreas Peter
    Willem Jonker
    Designs, Codes and Cryptography, 2020, 88 : 363 - 390
  • [42] A secure and efficient multi-authority proactive election scheme
    Singh, Ashish Kumar
    Chandran, Priya
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 208 - 218
  • [43] Round-optimal Constant-size Blind Signatures
    Blazy, Olivier
    Laura, Brouilhet
    Chevalier, Celine
    Fournaise, Neals
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 213 - 224
  • [44] Revocable Group Signature with Constant-Size Revocation List
    Attrapadung, Nuttapong
    Emura, Keita
    Hanaoka, Goichiro
    Sakai, Yusuke
    COMPUTER JOURNAL, 2015, 58 (10): : 2698 - 2715
  • [45] On the security of a practical constant-size ring signature scheme
    Zhang, Jianhong
    Bai, Wenle
    Jiang, Zhengtao
    International Journal of Network Security, 2020, 22 (03) : 394 - 398
  • [46] A secure and optimally efficient multi-authority election scheme
    Cramer, R
    Gennaro, R
    Schoenmakers, B
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 1997, 8 (05): : 481 - 490
  • [47] Transferable Constant-Size Fair E-Cash
    Fuchsbauer, Georg
    Pointcheval, David
    Vergnaud, Damien
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 226 - 247
  • [48] Short lattice signatures with constant-size public keys
    Xie, Dong
    Peng, Haipeng
    Li, Lixiang
    Yang, Yixian
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5490 - 5501
  • [49] Fuzzy matching: multi-authority attribute searchable encryption without central authority
    Binrui Zhu
    Jiameng Sun
    Jing Qin
    Jixin Ma
    Soft Computing, 2019, 23 : 527 - 536
  • [50] Reliable Access Control for Multi-authority in Cloud Storage
    Ren, Yongjun
    Yang, Zhenqi
    Wang, Jin
    Fang, Liming
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 113 - 116