Expiration and Revocation of Keys for Attribute-Based Signatures

被引:5
|
作者
Tate, Stephen R. [1 ]
Vishwanathan, Roopa [2 ]
机构
[1] UNC Greensboro, Dept Comp Sci, Greensboro, NC 27402 USA
[2] SUNY Poly, Dept Comp Sci, Utica, NY 13502 USA
关键词
Attribute-based signatures; Key revocation; Key expiration;
D O I
10.1007/978-3-319-20810-7_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based signatures, introduced by Maji et al., are signatures that prove that an authority has issued the signer "attributes" that satisfy some specified predicate. In existing attribute-based signature schemes, keys are valid indefinitely once issued. In this paper, we initiate the study of incorporating time into attribute-based signatures, where a time instance is embedded in every signature, and attributes are restricted to producing signatures with times that fall in designated validity intervals. We provide three implementations that vary in granularity of assigning validity intervals to attributes, including a scheme in which each attribute has its own independent validity interval, a scheme in which all attributes share a common validity interval, and a scheme in which sets of attributes share validity intervals. All of our schemes provide anonymity to a signer, hide the attributes used to create the signature, and provide collusion-resistance between users.
引用
收藏
页码:153 / 169
页数:17
相关论文
共 50 条
  • [31] A privacy preserving attribute-based encryption scheme with user revocation
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2281 - 2292
  • [32] Multi-authority attribute-based encryption with efficient revocation
    Zhang K.
    Ma J.-F.
    Li H.
    Zhang J.-W.
    Zhang T.
    [J]. Tongxin Xuebao/Journal on Communications, 2017, 38 (03): : 83 - 91
  • [33] Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers
    Lueks, Wouter
    Alpar, Gergely
    Hoepman, Jaap-Henk
    Vullers, Pim
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 463 - 478
  • [34] Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
    Attrapadung, Nuttapong
    Imai, Hideki
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2009, 5921 : 278 - 300
  • [35] An attribute-based encryption scheme for traitor tracing and revocation together
    Ma, Hai-Ying
    Zeng, Guo-Sun
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (09): : 1845 - 1855
  • [36] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    [J]. SENSORS, 2019, 19 (07)
  • [37] Fast revocation of attribute-based credentials for both users and verifiers
    Lueks, Wouter
    Alpar, Gergely
    Hoepman, Jaap-Henk
    Vullers, Pim
    [J]. COMPUTERS & SECURITY, 2017, 67 : 308 - 323
  • [38] Zero-knowledge Proofs for Attribute-Based Group Signatures with Verifier-local Revocation Over Lattices
    Zhang Yanhua
    Hu Yupu
    Liu Ximeng
    Zhang Qikun
    Jia Huiwen
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (02) : 315 - 321
  • [39] Attribute-Based Signatures for Supporting Anonymous Certification
    Kaaniche, Nesrine
    Laurent, Maryline
    [J]. COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 279 - 300
  • [40] Short Attribute-Based Signatures for Threshold Predicates
    Herranz, Javier
    Laguillaumie, Fabien
    Libert, Benoit
    Rafols, Carla
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 51 - +