Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems

被引:0
|
作者
Shahandashti, Siamak F. [1 ]
Safavi-Naini, Reihaneh [2 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[2] Univ Calgary, Dept Comp Sci, Calgary, AB T2N 1N4, Canada
来源
关键词
IDENTITY-BASED ENCRYPTION; KNOWLEDGE; PROOFS; SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we propose threshold attribute-based signatures (t-ABS). A t-ABS scheme enables a signature holder to prove possession of signatures by revealing only the relevant attributes of the signer, hence providing signer-attribute privacy for the signature holder. We define t-ABS schemes, formalize their security and propose two t-ABS schemes: a basic scheme secure against selective forgery and a second one secure against existential forgery, both provable in the standard model, assuming hardness of the CDH problem. We show that our basic t-ABS scheme can be augmented with two extra protocols that are used for efficiently issuing and verifying t-ABS signatures on committed values. We call the augmented scheme a threshold attribute based c-signature scheme (t-ABCS). We show how a t-ABCS scheme can be used to realize a secure threshold attribute-based anonymous credential system (t-ABACS) providing issuer-attribute privacy. We propose a security model for t-ABACS, give a concrete scheme using t-ABCS scheme, and prove that the credential system is secure if the t-ABCS scheme is secure.
引用
收藏
页码:198 / +
页数:3
相关论文
共 50 条
  • [31] Compact Multiple Attribute-Based Signatures With Key Aggregation and Its Application
    Guo, Rui
    Li, Kemeng
    Li, Xiong
    Zhang, Yinghui
    Li, Xuelei
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 3025 - 3035
  • [32] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 487 - 492
  • [33] Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems
    Fathi, Hanane
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2010, 54 (01) : 225 - 236
  • [34] Threshold attribute-based signcryption and its application to authenticated key agreement
    Zheng, Haibin
    Qin, Jing
    Hu, Jiankun
    Wu, Qianhong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 4914 - 4923
  • [35] Anonymous attribute certificates based on traceable signatures
    Benjumea, Vicente
    Lopez, Javier
    Troya, Jose M.
    [J]. INTERNET RESEARCH, 2006, 16 (02) : 120 - 139
  • [36] Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems
    Hanane Fathi
    SeongHan Shin
    Kazukuni Kobara
    Hideki Imai
    [J]. Wireless Personal Communications, 2010, 54 : 225 - 236
  • [37] An Efficient and Anonymous Attribute-Based Group Setup Scheme
    Li, Bing
    Wang, Zhijie
    Huang, Dijiang
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 861 - 866
  • [38] Expiration and Revocation of Keys for Attribute-Based Signatures
    Tate, Stephen R.
    Vishwanathan, Roopa
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 153 - 169
  • [39] Attribute-Based Signatures with Advanced Delegation, and Tracing
    Delerablee, Cecile
    Gouriou, Lenaick
    Pointcheval, David
    [J]. TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 224 - 248
  • [40] Vulnerabilities in Anonymous Credential Systems
    Bhaskar, R.
    Chandrasekaran, K.
    Lokam, S. V.
    Montgomery, P. L.
    Venkatesan, R.
    Yacobi, Y.
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (02) : 141 - 148