An Efficient Self-blindable Attribute-Based Credential Scheme

被引:11
|
作者
Ringers, Sietse [1 ]
Verheul, Eric [1 ]
Hoepman, Jaap-Henk [1 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
关键词
Attribute-based credentials; Unlinkable; Self-blindable Elliptic curves; Bilinear pairings; ANONYMOUS CREDENTIALS; SIGNATURE SCHEMES;
D O I
10.1007/978-3-319-70972-7_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An attribute-based credential scheme allows a user, given a set of attributes, to prove ownership of these attributes to a verifier, voluntarily disclosing some of them while keeping the others secret. A number of such schemes exist, of which some additionally provide unlinkability: that is, when the same attributes were disclosed in two transactions, it is not possible to tell if one and the same or two different credentials were involved. Recently full-fledged implementations of such schemes on smart cards have emerged; however, these need to compromise the security level to achieve reasonable transaction speeds. In this paper we present a new unlinkable attribute-based credential scheme with a full security proof, using a known hardness assumption in the standard model. Defined on elliptic curves, the scheme involves bilinear pairings but only on the verifier's side, making it very efficient both in terms of speed and size on the user's side.
引用
收藏
页码:3 / 20
页数:18
相关论文
共 50 条
  • [21] An efficient attribute-based signature scheme with claim-predicate mechanism
    Wang, Changji
    Li, Wentao
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 151 - 159
  • [22] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Xia, Zhihua
    Zhang, Liangao
    Liu, Dandan
    CHINA COMMUNICATIONS, 2016, 13 (07) : 92 - 99
  • [23] Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures
    Chen, Yang
    Li, Wenmin
    Gao, Fei
    Yin, Wei
    Liang, Kaitai
    Zhang, Hua
    Wen, Qiaoyan
    COMPUTER JOURNAL, 2019, 62 (12): : 1748 - 1760
  • [24] OABS: Efficient Outsourced Attribute-Based Signature Scheme With Constant Size
    Kang, Zhaozhe
    Li, Jiguo
    Zuo, Yuting
    Zhang, Yichen
    Han, Jinguang
    IEEE Internet of Things Journal, 2024, 11 (23) : 38167 - 38177
  • [25] Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems
    Ma, Hua
    Xie, Ying
    Wang, Jianfeng
    Tian, Guohua
    Liu, Zhenhua
    IEEE ACCESS, 2019, 7 : 89205 - 89217
  • [27] An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
    Wang, Shulan
    Zhou, Junwei
    Liu, Joseph K.
    Yu, Jianping
    Chen, Jianyong
    Xie, Weixin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1265 - 1277
  • [28] Efficient strong privacy protection and transferable attribute-based ticket scheme
    Feng H.
    Shi R.
    Yuan F.
    Li Y.
    Yang Y.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (03): : 63 - 75
  • [29] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Zhihua Xia
    Liangao Zhang
    Dandan Liu
    China Communications, 2016, 13 (07) : 92 - 99
  • [30] Attribute-based ring signcryption scheme
    Guo, Zhenzhou
    Li, Mingchu
    Fan, Xinxin
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (06) : 790 - 796