An efficient anonymous credential system

被引:0
|
作者
Akagi, Norio [1 ]
Manabe, Yoshifumi [1 ]
Okamoto, Tatsuaki [1 ]
机构
[1] Kyoto Univ, Grad Sch Informat, Dept Social Informat, Kyoto 6068501, Japan
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents an efficient anonymous credential system that includes two variants. One is a system that lacks a credential revoking protocol, but provides perfect anonymity-unlinkability and computational unforgeability under the strong Diffic-Hellman assumption. It is more efficient than existing credential systems with no revocation. The other is a system that provides revocation as well as computational anonymity-unlinkability and unforgeability under the strong Diffie-Hellman and decision linear Diffie-Hellman assumptions. This system provides two types of revocation simultaneously: one is to blacklist a user who acted wrong so that he can no longer use his credential, and the other is identifying a user who acted wrong from his usage of credential. Both systems are provably secure under the above-mentioned assumptions in the standard model.
引用
收藏
页码:272 / 286
页数:15
相关论文
共 50 条
  • [1] Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes
    Sadiah, Shahidatul
    Nakanishi, Toru
    Funabiki, Nobuo
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 262 - 278
  • [2] Efficient Proofs of Attributes in Pairing-Based Anonymous Credential System
    Sudarsono, Amang
    Nakanishi, Toru
    Funabiki, Nobuo
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2011, 6794 : 246 - 263
  • [3] Probably Secure Efficient Anonymous Credential Scheme
    Wu, Chien-Nan
    Fan, Chun-, I
    Huang, Jheng-Jia
    Tseng, Yi-Fan
    Kikuchi, Hiroaki
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE INNOVATION, 2018, 6 (03) : 18 - 35
  • [4] Security analysis and fix of an anonymous credential system
    Yang, YJ
    Bao, F
    Deng, RH
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 537 - 547
  • [5] Implementation of Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes Excluding Restriction
    Sadiah, Shahidatul
    Nakanishi, Toru
    Funabiki, Nobuo
    [J]. 2014 SECOND INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2014, : 531 - 535
  • [6] An Efficient Blacklistable Anonymous Credential System with Reputation Using Pairing-based Accumulator
    Nakanishi, Toru
    Kanatani, Takeshi
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1140 - 1148
  • [7] Efficient blacklistable anonymous credential system with reputation using a pairing-based accumulator
    Nakanishi, Toru
    Kanatani, Takeshi
    [J]. IET INFORMATION SECURITY, 2020, 14 (06) : 613 - 624
  • [8] Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System
    Begum, Nasima
    Nakanishi, Toru
    Funabiki, Nobuo
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (12) : 2422 - 2433
  • [9] An efficient and usable multi-show non-transferable anonymous credential system
    Persiano, G
    Visconti, I
    [J]. FINANCIAL CRYPTOGRAPHY, 2004, 3110 : 196 - 211
  • [10] A credential-based system for the anonymous delegation of rights
    Demuynck, Liesje
    De Decker, Bart
    Joosen, Wouter
    [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 169 - +