Attribute Based Key-Insulated Signatures with Message Recovery

被引:1
作者
Rao, Y. Sreenivasa [1 ]
Dutta, Ratna [1 ]
机构
[1] Indian Inst Technol, Kharagpur 721302, W Bengal, India
来源
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014 | 2015年 / 8958卷
关键词
Attribute based signature; Key-insulation; Message recovery; Linear secret-sharing scheme; Constant message-signature length;
D O I
10.1007/978-3-319-21966-0_16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order tominimize the impact of secret signing key exposure in attribute based signature scenario, we design two attribute based key-insulated signature (ABKIS) with message recovery schemes for expressive linear secret-sharing scheme (LSSS)-realizable access structures utilizing only 4 bilinear pairing operations in verification process and making the message-signature length constant. The first scheme deals with small universes of attributes while the second construction supports large universe of attributes. The signing key is computed according to LSSS access structure over signer's attributes, and is later updated at discrete time periods with the help of a physically secure but computationally limited device, called helper, without changing the access structure. A signing key for some time period is used to sign every message during that time period. The original message is not required to be transmitted with the signature, however, it can be recovered during verification procedure. The size of signing key in the proposed schemes is quadratic in number of attributes. The (strong) key-insulated security of our ABKIS primitives is reduced to the classical computational Diffie Hellman Exponent problem in selective attribute set and random oracle model. We also show that both the proposed signature constructions provide signer privacy.
引用
收藏
页码:215 / 229
页数:15
相关论文
共 15 条
[1]   Attribute-based encryption schemes with constant-size ciphertexts [J].
Attrapadung, Nuttapong ;
Herranz, Javier ;
Laguillaumie, Fabien ;
Libert, Benoit ;
de Panafieu, Elie ;
Rafols, Carla .
THEORETICAL COMPUTER SCIENCE, 2012, 422 :15-38
[2]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P255
[3]  
Chen JH, 2011, J INF SCI ENG, V27, P437
[4]   Attribute-based key-insulated signature and its applications [J].
Chen, Jianhong ;
Long, Yu ;
Chen, Kefei ;
Guo, Jie .
INFORMATION SCIENCES, 2014, 275 :57-67
[5]  
Dodis Y, 2002, LECT NOTES COMPUT SC, V2332, P65
[6]  
Gagne Martin, 2012, Pairing-Based Cryptography - Pairing 2012. 5th International Conference. Revised Selected Papers, P295, DOI 10.1007/978-3-642-36334-4_19
[7]  
Itkis G, 2002, LECT NOTES COMPUT SC, V2442, P499
[8]  
Kefeng Wang, 2014, Information Security Practice and Experience. 10th International Conference, ISPEC 2014. Proceedings: LNCS 8434, P433, DOI 10.1007/978-3-319-06320-1_32
[9]  
Li J., 2010, S INF COMP COMM SEC, P60, DOI [DOI 10.1145/1755688.1755697, 10.1145/1755688.1755697]
[10]   Hidden attribute-based signatures without anonymity revocation [J].
Li, Jin ;
Kim, Kwangjo .
INFORMATION SCIENCES, 2010, 180 (09) :1681-1689