ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things

被引:57
作者
Su, Jinshu [1 ]
Cao, Dan [1 ]
Zhao, Baokang [1 ]
Wang, Xiaofeng [1 ]
You, Ilsun [2 ]
机构
[1] Natl Univ Def Technol, Sch Comp Sci, Changsha 410073, Hunan, Peoples R China
[2] Korean Bible Univ, Sch Informat Sci, Seoul 139791, South Korea
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2014年 / 33卷
基金
高等学校博士学科点专项科研基金; 美国国家科学基金会;
关键词
Internet of Things; Policy; Attribute-based signature; Unforgeability; Diffie-Hellman; Privacy; Security;
D O I
10.1016/j.future.2013.10.016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) provides anywhere, anything, anytime connections, for which user privacy is vulnerable and authentication methods that favor policy over attributes are essential. Thus, a signature scheme that considers user privacy and implements an attributes policy is required. Emerging attribute-based signature (ABS) schemes allow a requester of a resource to generate a signature with attributes satisfying the policy without leaking more information. However, few existing approaches simultaneously achieve an expressive policy and security under the standard Diffie-Hellman assumption. Here we describe ePASS, a novel ABS scheme that uses an attribute tree and expresses any policy consisting of AND, OR threshold gates under the computational Diffie-Hellman problem. Users cannot forge signatures with attributes they do not possess, and the signature provides assurance that only a user with appropriate attributes satisfying the policy can endorse the message, resulting in unforgeability. However, legitimate signers remain anonymous and are indistinguishable among all users whose attributes satisfy the policy, which provides attribute privacy for the signer. Compared to existing schemes, our approach delivers enhanced performance by reducing the computational cost and signature size. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:11 / 18
页数:8
相关论文
共 26 条
[1]  
[Anonymous], 2008, IACR Cryptol. ePrint Arch.
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[4]  
Chin-Liang Wang, 2009, 2009 IEEE Wireless Communications and Networking Conference, DOI 10.1109/WCNC.2009.4917575
[5]   Attribute-based signature scheme with constant size signature in the standard model [J].
Ge, A-J ;
Ma, C-G ;
Zhang, Z-F .
IET INFORMATION SECURITY, 2012, 6 (02) :47-54
[6]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[7]   Attribute-based signature scheme [J].
Guo Shaniqng ;
Zeng Yingpei .
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, :509-+
[8]  
Karchmer M., 1993, Proceedings of the Eighth Annual Structure in Complexity Theory Conference (Cat. No.93CH3281-3), P102, DOI 10.1109/SCT.1993.336536
[9]  
KHADER D, 2008, IACR CRYPTOLOGY EPRI, P31
[10]  
Khader D, 2007, IACR CRYPTOLOGY EPRI, V241