An Efficient Self-blindable Attribute-Based Credential Scheme

被引:13
|
作者
Ringers, Sietse [1 ]
Verheul, Eric [1 ]
Hoepman, Jaap-Henk [1 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017 | 2017年 / 10322卷
关键词
Attribute-based credentials; Unlinkable; Self-blindable Elliptic curves; Bilinear pairings; ANONYMOUS CREDENTIALS; SIGNATURE SCHEMES;
D O I
10.1007/978-3-319-70972-7_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An attribute-based credential scheme allows a user, given a set of attributes, to prove ownership of these attributes to a verifier, voluntarily disclosing some of them while keeping the others secret. A number of such schemes exist, of which some additionally provide unlinkability: that is, when the same attributes were disclosed in two transactions, it is not possible to tell if one and the same or two different credentials were involved. Recently full-fledged implementations of such schemes on smart cards have emerged; however, these need to compromise the security level to achieve reasonable transaction speeds. In this paper we present a new unlinkable attribute-based credential scheme with a full security proof, using a known hardness assumption in the standard model. Defined on elliptic curves, the scheme involves bilinear pairings but only on the verifier's side, making it very efficient both in terms of speed and size on the user's side.
引用
收藏
页码:3 / 20
页数:18
相关论文
共 50 条
  • [41] Efficient Signature Scheme with Batch Verifications in Identity-Based Framework
    Gopal, P. V. S. S. N.
    Reddy, P. Vasudeva
    Gowri, T.
    ETRI JOURNAL, 2016, 38 (02) : 397 - 404
  • [42] Efficient Identity Based Multi-Signcryption Scheme with Public Verifiability
    Swapna, G.
    Reddy, P. Vasudeva
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (02): : 181 - 190
  • [43] An efficient CDH-based signature scheme with a tight security reduction
    Chevallier-Mames, B
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 511 - 526
  • [44] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [45] An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption
    柴震川
    曹珍富
    陆荣幸
    JournalofShanghaiJiaotongUniversity(Science), 2006, (03) : 271 - 278
  • [46] AN EFFICIENT AND PROVABLY SECURE ID-BASED SIGNATURE SCHEME WITH BATCH VERIFICATIONS
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (11A): : 3911 - 3922
  • [47] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (04) : 421 - 428
  • [48] An Efficient Identity Based Anonymous Identification Scheme for Ad-hoc Groups from Pairings
    Gu, Chunxiang
    Zhu, Yuefei
    Ma, Chuangui
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4858 - +
  • [49] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Rajeev Anand Sahu
    Sahadeo Padhye
    Frontiers of Computer Science, 2012, 6 : 421 - 428
  • [50] Provably Secure and Efficient ID-based Strong Designated Verifier Signature Scheme with Message Recovery
    Li, Min
    Fang, Tao
    2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014), 2014, : 287 - 293