Attribute-Based Signatures for Range of Inner Product and Its Applications

被引:0
|
作者
Ishizaka, Masahito [1 ]
Fukushima, Kazuhide [1 ]
机构
[1] KDDI Res Inc, Saitama, Japan
来源
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022 | 2023年 / 13849卷
关键词
Attribute-based signatures for range of inner product; Adaptive unforgeablity; Signer-privacy; Symmetric bilinear groups of prime order; ENCRYPTION; SECURITY;
D O I
10.1007/978-3-031-29371-9_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In attribute-based signatures (ABS) for inner products, the digital signature analogue of attribute-based encryption for inner products (Katz et al., EuroCrypt'08), a signing-key (resp. signature) is labeled with an n-dimensional vector x is an element of Z(p)(n) (resp. y is an element of Z(p)(n)) for a prime p, and the signing succeeds iff their inner product is zero, i.e., < x, y > = 0 (mod p). We generalize it to ABS for range of inner product (ARIP), requiring the inner product to be within an arbitrarily-chosen range [L, R]. As security notions, we define adaptive unforgeablity and perfect signer-privacy. The latter means that any signature reveals no more information about x than < x, y > is an element of [L, R]. We propose two efficient schemes, secure under some Diffie-Hellman type assumptions in the standard model, based on noninteractive proof and linearly homomorphic signatures. The 2nd (resp. 1st) scheme is independent of the parameter n in secret-key size (resp. signature size and verification cost). We show that ARIP has many applications, e.g., ABS for range evaluation of polynomials/weighted averages, fuzzy identity-based signatures, time-specific signatures, ABS for range of Hamming/Euclidean distance and ABS for hyperellipsoid predicates.
引用
收藏
页码:382 / 407
页数:26
相关论文
共 50 条
  • [41] Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
    Shahandashti, Siamak F.
    Safavi-Naini, Reihaneh
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 198 - +
  • [42] SPCABS: Signature-Policy Comparable Attribute-Based Signatures
    Chen, Hongying
    Huang, Zhenjie
    Huang, Hui
    Guo, Yafeng
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [43] Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs
    Datta, Pratish
    Okamoto, Tatsuaki
    Takashima, Katsuyuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 25 - 57
  • [44] Fully Dynamic Attribute-Based Signatures for Circuits from Codes
    Ling, San
    Nguyen, Khoa
    Phan, Duong Hieu
    Tang, Khai Hanh
    Wang, Huaxiong
    Xu, Yanhong
    PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 37 - 73
  • [45] Attribute-based data dissemination for Internet applications
    Malan, GR
    Jahanian, F
    Subramanian, S
    JOURNAL OF HIGH SPEED NETWORKS, 1998, 7 (3-4) : 319 - 337
  • [46] A Delegation Attack Method on Attribute-Based Signatures and Probable Solutions
    Hao, Jialu
    Wu, Wei
    Wang, Shuo
    Zhong, Xiaoge
    Chu, Guang
    Shao, Feng
    MATHEMATICS, 2023, 11 (01)
  • [47] Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded
    Datta, Pratish
    Pal, Tapas
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT I, 2023, 13940 : 587 - 621
  • [48] Attribute-based clustering methodology for product family design
    Ye, Xiaoli
    Gershenson, John K.
    JOURNAL OF ENGINEERING DESIGN, 2008, 19 (06) : 571 - 586
  • [49] Attribute-Based Access Control in Web Applications
    Kauser, Sadia
    Rahman, Ayesha
    Khan, Asad Mohammed
    Ahmad, Tameem
    APPLICATIONS OF ARTIFICIAL INTELLIGENCE TECHNIQUES IN ENGINEERING, SIGMA 2018, VOL 1, 2019, 698 : 385 - 393
  • [50] Threshold attribute-based signature and its security
    Ma, Chun-Guang
    Shi, Lan
    Zhou, Chang-Li
    Wang, Ding
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2013, 41 (05): : 1012 - 1015