An Efficient Self-blindable Attribute-Based Credential Scheme

被引:13
|
作者
Ringers, Sietse [1 ]
Verheul, Eric [1 ]
Hoepman, Jaap-Henk [1 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017 | 2017年 / 10322卷
关键词
Attribute-based credentials; Unlinkable; Self-blindable Elliptic curves; Bilinear pairings; ANONYMOUS CREDENTIALS; SIGNATURE SCHEMES;
D O I
10.1007/978-3-319-70972-7_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An attribute-based credential scheme allows a user, given a set of attributes, to prove ownership of these attributes to a verifier, voluntarily disclosing some of them while keeping the others secret. A number of such schemes exist, of which some additionally provide unlinkability: that is, when the same attributes were disclosed in two transactions, it is not possible to tell if one and the same or two different credentials were involved. Recently full-fledged implementations of such schemes on smart cards have emerged; however, these need to compromise the security level to achieve reasonable transaction speeds. In this paper we present a new unlinkable attribute-based credential scheme with a full security proof, using a known hardness assumption in the standard model. Defined on elliptic curves, the scheme involves bilinear pairings but only on the verifier's side, making it very efficient both in terms of speed and size on the user's side.
引用
收藏
页码:3 / 20
页数:18
相关论文
共 50 条
  • [11] Attribute-Based Credentials in High-Density Platooning
    Zimmermann, Christian
    Sontwoski, Markus
    Kopsell, Stefan
    ACM COMPUTER SCIENCE IN CARS SYMPOSIUM (CSCS 2019), 2019,
  • [12] Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model
    Okamoto, Tatsuaki
    Takashima, Katsuyuki
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 35 - +
  • [13] One Attribute-Based Proxy Signature
    Sun Changxia
    Yan Yu
    Guo Yufeng
    Si Haiping
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MECHATRONICS, ELECTRONIC, INDUSTRIAL AND CONTROL ENGINEERING, 2015, 8 : 1235 - 1239
  • [14] Towards Attribute-Based Credentials in the Cloud
    Krenn, Stephan
    Lorunser, Thomas
    Salzer, Anja
    Striecks, Christoph
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 179 - 202
  • [15] Threshold Attribute-Based Credentials With Redactable Signature
    Shi, Rui
    Feng, Huamin
    Yang, Yang
    Yuan, Feng
    Li, Yingjiu
    Pang, Hwee Hwa
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3751 - 3765
  • [16] Attribute-based credentials with cryptographic collusion prevention
    Hajny, Jan
    Dzurenda, Petr
    Malina, Lukas
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3836 - 3846
  • [17] Issuer-Hiding Attribute-Based Credentials
    Bobolz, Jan
    Eidens, Fabian
    Krenn, Stephan
    Ramacher, Sebastian
    Samelin, Kai
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2021, 2021, 13099 : 158 - 178
  • [18] Privacy-Preserving Auditing for Attribute-Based Credentials
    Camenisch, Jan
    Lehmann, Anja
    Neven, Gregory
    Rial, Alfredo
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 109 - 127
  • [19] Anonymous Attribute-based Credentials in Collaborative Indoor Positioning Systems
    Casanova-Marques, Raul
    Pascacio, Pavel
    Hajny, Jan
    Torres-Sospedra, Joaquin
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 791 - 797
  • [20] attribute-based ring signatures: security analysis and a new construction
    Toluee, Rahim
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,