An Efficient Self-blindable Attribute-Based Credential Scheme

被引:11
|
作者
Ringers, Sietse [1 ]
Verheul, Eric [1 ]
Hoepman, Jaap-Henk [1 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
关键词
Attribute-based credentials; Unlinkable; Self-blindable Elliptic curves; Bilinear pairings; ANONYMOUS CREDENTIALS; SIGNATURE SCHEMES;
D O I
10.1007/978-3-319-70972-7_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An attribute-based credential scheme allows a user, given a set of attributes, to prove ownership of these attributes to a verifier, voluntarily disclosing some of them while keeping the others secret. A number of such schemes exist, of which some additionally provide unlinkability: that is, when the same attributes were disclosed in two transactions, it is not possible to tell if one and the same or two different credentials were involved. Recently full-fledged implementations of such schemes on smart cards have emerged; however, these need to compromise the security level to achieve reasonable transaction speeds. In this paper we present a new unlinkable attribute-based credential scheme with a full security proof, using a known hardness assumption in the standard model. Defined on elliptic curves, the scheme involves bilinear pairings but only on the verifier's side, making it very efficient both in terms of speed and size on the user's side.
引用
收藏
页码:3 / 20
页数:18
相关论文
共 50 条
  • [1] Anonymous attribute authentication scheme using self-blindable certificates
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 215 - +
  • [2] Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices
    Yang, Yanjiang
    Ding, Xuhua
    Lu, Haibing
    Weng, Jian
    Zhou, Jianying
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 238 - 247
  • [3] On Linkability and Malleability in Self-blindable Credentials
    Hoepman, Jaap-Henk
    Lueks, Wouter
    Ringers, Sietse
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2015, 2015, 9311 : 203 - 218
  • [4] An Efficient Attribute-Based Ring Signature Scheme
    Wang Wenqiang
    Chen Shaozhen
    2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 147 - 150
  • [5] Efficient revocable attribute-based encryption scheme
    Li X.
    Zhang D.
    Li H.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [6] Dedicated Hardware for Attribute-Based Credential Verification
    Ottoy, Geoffrey
    Lapon, Jorn
    Naessens, Vincent
    Preneel, Bart
    De Strycker, Lieven
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013, 2013, 8099 : 50 - 65
  • [7] An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment
    Pussewalage, Harsha S. Gardiyawasam
    Oleshchuk, Vladimir A.
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (03)
  • [8] Attribute-based broadcast encryption scheme made efficient
    Lubicz, David
    Sirvent, Thomas
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 325 - +
  • [9] An Efficient and Anonymous Attribute-Based Group Setup Scheme
    Li, Bing
    Wang, Zhijie
    Huang, Dijiang
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 861 - 866
  • [10] Attribute-based anonymous credential: Delegation, traceability, and revocation
    Li, Peng
    Lai, Junzuo
    Yang, Ye
    Sun, Meng
    Wu, Chi
    Wu, Wei
    Yuan, Xiaowei
    COMPUTER NETWORKS, 2023, 237