Attribute-Based Signatures

被引:0
作者
Maji, Hemanta K. [1 ]
Prabhakaran, Manoj [1 ]
Rosulek, Mike [2 ]
机构
[1] Univ Illinois, Dept Comp Sci, 1304 W Springfield Ave, Urbana, IL 61801 USA
[2] Univ Montana, Dept Comp Sci, Missoula, MT 59812 USA
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2011 | 2011年 / 6558卷
基金
美国国家科学基金会;
关键词
IDENTITY-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce Attribute-Based Signatures (ABS), a versatile primitive that allows a party to sign a message with fine-grained control over identifying information. In ABS, a signer, who possesses a set of attributes from the authority, can sign a message with a predicate that is satisfied by his attributes. The signature reveals no more than the fact that a single user with some set of attributes satisfying the predicate has attested to the message. In particular, the signature hides the attributes used to satisfy the predicate and any identifying information about the signer (that could link multiple signatures as being from the same signer). Furthermore, users cannot collude to pool their attributes together. We give a general framework for constructing ABS schemes, and then show several practical instantiations based on groups with bilinear pairing operations, under standard assumptions. Further, we give a construction which is secure even against a malicious attribute authority, but the security for this scheme is proven in the generic group model. We describe several practical problems that motivated this work, and how ABS can be used to solve them. Also, we show how our techniques allow us to extend Groth-Sahai NIZK proofs to be simulation-extractable and identity-based with low overhead.
引用
收藏
页码:376 / +
页数:3
相关论文
共 31 条
[1]  
[Anonymous], 2008290 CRYPT EPRINT
[2]  
Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P614
[3]   Security Proofs for Identity-Based Identification and Signature Schemes [J].
Bellare, Mihir ;
Namprempre, Chanathip ;
Neven, Gregory .
JOURNAL OF CRYPTOLOGY, 2009, 22 (01) :1-61
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]   Using attribute-based access control to enable attribute-based messaging [J].
Bobba, Rakesh ;
Fatemieh, Omid ;
Khan, Fariba ;
Gunter, Carl A. ;
Khurana, Himanshu .
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, :403-+
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3152, P443
[7]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[10]  
Boyen X, 2007, LECT NOTES COMPUT SC, V4515, P210