Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems

被引:0
|
作者
Shahandashti, Siamak F. [1 ]
Safavi-Naini, Reihaneh [2 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[2] Univ Calgary, Dept Comp Sci, Calgary, AB T2N 1N4, Canada
来源
关键词
IDENTITY-BASED ENCRYPTION; KNOWLEDGE; PROOFS; SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we propose threshold attribute-based signatures (t-ABS). A t-ABS scheme enables a signature holder to prove possession of signatures by revealing only the relevant attributes of the signer, hence providing signer-attribute privacy for the signature holder. We define t-ABS schemes, formalize their security and propose two t-ABS schemes: a basic scheme secure against selective forgery and a second one secure against existential forgery, both provable in the standard model, assuming hardness of the CDH problem. We show that our basic t-ABS scheme can be augmented with two extra protocols that are used for efficiently issuing and verifying t-ABS signatures on committed values. We call the augmented scheme a threshold attribute based c-signature scheme (t-ABCS). We show how a t-ABCS scheme can be used to realize a secure threshold attribute-based anonymous credential system (t-ABACS) providing issuer-attribute privacy. We propose a security model for t-ABACS, give a concrete scheme using t-ABCS scheme, and prove that the credential system is secure if the t-ABCS scheme is secure.
引用
收藏
页码:198 / +
页数:3
相关论文
共 50 条
  • [1] Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems
    Au, Man Ho
    Tsang, Patrick P.
    Susilo, Willy
    Mu, Yi
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 295 - +
  • [2] Attribute-based anonymous credential: Delegation, traceability, and revocation
    Li, Peng
    Lai, Junzuo
    Yang, Ye
    Sun, Meng
    Wu, Chi
    Wu, Wei
    Yuan, Xiaowei
    [J]. COMPUTER NETWORKS, 2023, 237
  • [3] Attribute-Based Signatures for Supporting Anonymous Certification
    Kaaniche, Nesrine
    Laurent, Maryline
    [J]. COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 279 - 300
  • [4] Short Attribute-Based Signatures for Threshold Predicates
    Herranz, Javier
    Laguillaumie, Fabien
    Libert, Benoit
    Rafols, Carla
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 51 - +
  • [5] An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment
    Pussewalage, Harsha S. Gardiyawasam
    Oleshchuk, Vladimir A.
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (03)
  • [6] Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use
    Chan, Kwan Yin
    Yuen, Tsz Hon
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2022, 2022, 13641 : 89 - 121
  • [7] Attribute-Based Signatures
    Maji, Hemanta K.
    Prabhakaran, Manoj
    Rosulek, Mike
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 376 - +
  • [8] Dedicated Hardware for Attribute-Based Credential Verification
    Ottoy, Geoffrey
    Lapon, Jorn
    Naessens, Vincent
    Preneel, Bart
    De Strycker, Lieven
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013, 2013, 8099 : 50 - 65
  • [9] Threshold BBS plus Signatures for Distributed Anonymous Credential Issuance
    Doerner, Jack
    Kondi, Yashvanth
    Lee, Eysa
    Shelat, Abhi
    Tyner, LaKyah
    [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 773 - 789
  • [10] Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures
    Zhang, Yinghui
    Zheng, Dong
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 870 - 874