Attribute Based Key-Insulated Signatures with Message Recovery

被引:1
|
作者
Rao, Y. Sreenivasa [1 ]
Dutta, Ratna [1 ]
机构
[1] Indian Inst Technol, Kharagpur 721302, W Bengal, India
关键词
Attribute based signature; Key-insulation; Message recovery; Linear secret-sharing scheme; Constant message-signature length;
D O I
10.1007/978-3-319-21966-0_16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order tominimize the impact of secret signing key exposure in attribute based signature scenario, we design two attribute based key-insulated signature (ABKIS) with message recovery schemes for expressive linear secret-sharing scheme (LSSS)-realizable access structures utilizing only 4 bilinear pairing operations in verification process and making the message-signature length constant. The first scheme deals with small universes of attributes while the second construction supports large universe of attributes. The signing key is computed according to LSSS access structure over signer's attributes, and is later updated at discrete time periods with the help of a physically secure but computationally limited device, called helper, without changing the access structure. A signing key for some time period is used to sign every message during that time period. The original message is not required to be transmitted with the signature, however, it can be recovered during verification procedure. The size of signing key in the proposed schemes is quadratic in number of attributes. The (strong) key-insulated security of our ABKIS primitives is reduced to the classical computational Diffie Hellman Exponent problem in selective attribute set and random oracle model. We also show that both the proposed signature constructions provide signer privacy.
引用
收藏
页码:215 / 229
页数:15
相关论文
共 50 条
  • [1] Bandwidth-efficient attribute-based key-insulated signatures with message recovery
    Rao, Y. Sreenivasa
    Dutta, Ratna
    INFORMATION SCIENCES, 2016, 369 : 648 - 673
  • [2] Attribute-Based Key-Insulated Encryption
    Chen, Jian-Hong
    Wang, Yong-Tao
    Chen, Ke-Fei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (02) : 437 - 449
  • [3] Attribute-Based Parallel Key-Insulated Signature
    Chen, Jianhong
    Yu, Kun
    Long, Yu
    Chen, Kefei
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (03) : 26 - 40
  • [4] Attribute-based key-insulated signature and its applications
    Chen, Jianhong
    Long, Yu
    Chen, Kefei
    Guo, Jie
    INFORMATION SCIENCES, 2014, 275 : 57 - 67
  • [5] Attribute-based key-insulated signature for boolean formula
    Rao, Y. Sreenivasa
    Dutta, Ratna
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (06) : 864 - 888
  • [6] Attribute-based key-insulated signcryption with bidirectional anonymity
    Zhang, Xing-Lan
    Zhang, Zhen
    Tongxin Xuebao/Journal on Communications, 2013, 34 (11): : 42 - 50
  • [7] Signature-policy attribute-based key-insulated signature
    Rao, Y. Sreenivasa
    IET INFORMATION SECURITY, 2017, 11 (01) : 23 - 33
  • [8] A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks
    Hanshu Hong
    Zhixin Sun
    Wireless Personal Communications, 2017, 95 : 1215 - 1228
  • [9] A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks
    Hong, Hanshu
    Sun, Zhixin
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 1215 - 1228
  • [10] Key-Insulated Signcryption
    Fan, Jia
    Zheng, Yuliang
    Tang, Xiaohu
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (10) : 1351 - 1374