An Efficient Self-blindable Attribute-Based Credential Scheme

被引:11
|
作者
Ringers, Sietse [1 ]
Verheul, Eric [1 ]
Hoepman, Jaap-Henk [1 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
关键词
Attribute-based credentials; Unlinkable; Self-blindable Elliptic curves; Bilinear pairings; ANONYMOUS CREDENTIALS; SIGNATURE SCHEMES;
D O I
10.1007/978-3-319-70972-7_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An attribute-based credential scheme allows a user, given a set of attributes, to prove ownership of these attributes to a verifier, voluntarily disclosing some of them while keeping the others secret. A number of such schemes exist, of which some additionally provide unlinkability: that is, when the same attributes were disclosed in two transactions, it is not possible to tell if one and the same or two different credentials were involved. Recently full-fledged implementations of such schemes on smart cards have emerged; however, these need to compromise the security level to achieve reasonable transaction speeds. In this paper we present a new unlinkable attribute-based credential scheme with a full security proof, using a known hardness assumption in the standard model. Defined on elliptic curves, the scheme involves bilinear pairings but only on the verifier's side, making it very efficient both in terms of speed and size on the user's side.
引用
收藏
页码:3 / 20
页数:18
相关论文
共 50 条
  • [11] The Self-blindable U-Prove Scheme from FC'14 Is Forgeable (Short Paper)
    Verheul, Eric
    Ringers, Sietse
    Hoepman, Jaap-Henk
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 339 - 345
  • [12] Zero-Cerd: A Self-Blindable Anonymous Authentication System Based on Blockchain
    YANG Kunwei
    YANG Bo
    WANG Tao
    ZHOU Yanwei
    Chinese Journal of Electronics, 2023, 32 (03) : 587 - 596
  • [13] Zero-Cerd: A Self-Blindable Anonymous Authentication System Based on Blockchain
    Yang Kunwei
    Yang Bo
    Wang Tao
    Zhou Yanwei
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (03) : 587 - 596
  • [14] Attribute-based signature scheme
    Guo Shaniqng
    Zeng Yingpei
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 509 - +
  • [15] Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme
    Li, Huixian
    Pang, Liaojun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
  • [16] Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
    Shahandashti, Siamak F.
    Safavi-Naini, Reihaneh
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 198 - +
  • [17] Efficient key-policy attribute-based encryption scheme
    Xu, Zhiqin
    Zhang, Leyou
    ICIC Express Letters, 2015, 9 (01): : 31 - 35
  • [18] Efficient Ciphertext Deduplication and Auditing Scheme with Attribute-based Encryption
    Ma Hua
    Dang Qianlong
    Wang Jianfeng
    Liu Zhenhua
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (02) : 355 - 361
  • [19] An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees
    Yang, Huihui
    Oleshchuk, Vladimir A.
    SECURE IT SYSTEMS, NORDSEC 2015, 2015, 9417 : 123 - 135
  • [20] Efficient and Forward-Secure Attribute-Based Sanitizable Signature Scheme
    Zhu L.
    Li J.
    Lu Y.
    Zhang Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (12): : 2737 - 2748