An Efficient Self-blindable Attribute-Based Credential Scheme

被引:11
|
作者
Ringers, Sietse [1 ]
Verheul, Eric [1 ]
Hoepman, Jaap-Henk [1 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
关键词
Attribute-based credentials; Unlinkable; Self-blindable Elliptic curves; Bilinear pairings; ANONYMOUS CREDENTIALS; SIGNATURE SCHEMES;
D O I
10.1007/978-3-319-70972-7_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An attribute-based credential scheme allows a user, given a set of attributes, to prove ownership of these attributes to a verifier, voluntarily disclosing some of them while keeping the others secret. A number of such schemes exist, of which some additionally provide unlinkability: that is, when the same attributes were disclosed in two transactions, it is not possible to tell if one and the same or two different credentials were involved. Recently full-fledged implementations of such schemes on smart cards have emerged; however, these need to compromise the security level to achieve reasonable transaction speeds. In this paper we present a new unlinkable attribute-based credential scheme with a full security proof, using a known hardness assumption in the standard model. Defined on elliptic curves, the scheme involves bilinear pairings but only on the verifier's side, making it very efficient both in terms of speed and size on the user's side.
引用
收藏
页码:3 / 20
页数:18
相关论文
共 50 条
  • [31] A Dynamic Attribute-Based Authentication Scheme
    Yang, Huihui
    Oleshchuk, Vladimir A.
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 106 - 118
  • [32] A Hierarchical Attribute-Based Encryption Scheme
    ZOU Xiubin
    Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 259 - 264
  • [33] On the Security of an Attribute-Based Signature Scheme
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Goi, Bok-Min
    U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2009, 62 : 161 - +
  • [34] Location privacy in VANETs: Provably secure anonymous key exchange protocol based on self-blindable signatures
    AlMarshoud, Mishri Saleh
    Al-Bayatti, Ali H.
    Kiraz, Mehmet Sabir
    VEHICULAR COMMUNICATIONS, 2022, 36
  • [35] A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption
    Yang, Tonghao
    Li, Junquan
    Yu, Bin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [36] Attribute-Based Encryption Scheme Based on SIFF
    Zhao, Tianyu
    Wei, Lingbo
    Zhang, Chi
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [37] An efficient attribute-based hierarchical data access control scheme in cloud computing
    He, Heng
    Zheng, Liang-han
    Li, Peng
    Deng, Li
    Huang, Li
    Chen, Xiang
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [38] Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
    Chen H.-S.
    Shen Q.-L.
    2018, Beijing University of Posts and Telecommunications (41): : 113 - 118
  • [39] Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption
    Fan, Kai
    Huang, Nana
    Wang, Yue
    Li, Hui
    Yang, Yintang
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 111 - 114
  • [40] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update
    Wang, Changji
    Yuan, Yuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 1031 - 1041