Expiration and Revocation of Keys for Attribute-Based Signatures

被引:5
|
作者
Tate, Stephen R. [1 ]
Vishwanathan, Roopa [2 ]
机构
[1] UNC Greensboro, Dept Comp Sci, Greensboro, NC 27402 USA
[2] SUNY Poly, Dept Comp Sci, Utica, NY 13502 USA
关键词
Attribute-based signatures; Key revocation; Key expiration;
D O I
10.1007/978-3-319-20810-7_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based signatures, introduced by Maji et al., are signatures that prove that an authority has issued the signer "attributes" that satisfy some specified predicate. In existing attribute-based signature schemes, keys are valid indefinitely once issued. In this paper, we initiate the study of incorporating time into attribute-based signatures, where a time instance is embedded in every signature, and attributes are restricted to producing signatures with times that fall in designated validity intervals. We provide three implementations that vary in granularity of assigning validity intervals to attributes, including a scheme in which each attribute has its own independent validity interval, a scheme in which all attributes share a common validity interval, and a scheme in which sets of attributes share validity intervals. All of our schemes provide anonymity to a signer, hide the attributes used to create the signature, and provide collusion-resistance between users.
引用
收藏
页码:153 / 169
页数:17
相关论文
共 50 条
  • [1] Hidden attribute-based signatures without anonymity revocation
    Li, Jin
    Kim, Kwangjo
    [J]. INFORMATION SCIENCES, 2010, 180 (09) : 1681 - 1689
  • [2] Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length
    Gardham, Daniel
    Manulis, Mark
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 89 - 109
  • [3] Revocation in an Attribute-Based Delegation Model
    Ye, Chunxiao
    Wu, Zhongfu
    Zhong, Jiang
    Feng, Yong
    [J]. PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 171 - 172
  • [4] Attribute-Based Signatures
    Maji, Hemanta K.
    Prabhakaran, Manoj
    Rosulek, Mike
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 376 - +
  • [5] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao, Jiaxin
    Sun, Jiameng
    Qin, Jing
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [6] Attribute-based Encryption with Flexible Revocation for IoV
    Chen, Ruoyu
    Li, Yuhong
    Rahmani, Rahim
    [J]. 18TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS, FNC 2023/20TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING, MOBISPC 2023/13TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, SEIT 2023, 2023, 224 : 131 - 138
  • [7] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [8] A survey on Attribute-Based Signatures
    Oberko, Prince Silas Kwesi
    Obeng, Victor-Hillary Kofi Setornyo
    Xiong, Hu
    Kumari, Saru
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 124
  • [9] Attribute-based signatures on lattices
    [J]. Jia, Xie (xiejia199325@163.com), 2016, Beijing University of Posts and Telecommunications (23):
  • [10] Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    Zhang Miao
    [J]. CHINA COMMUNICATIONS, 2012, 9 (09) : 22 - 40