Privacy-preserving and efficient attributes proof based on selective aggregate CL-signature scheme

被引:4
作者
Guo, Nan [1 ]
Gao, Tianhan [2 ]
Wang, Jia [1 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
[2] Northeastern Univ, Coll Software, Shenyang, Peoples R China
关键词
94A60; 11T71; aggregate signature; anonymous credential; privacy; attributes proof;
D O I
10.1080/00207160.2014.915961
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We propose efficient attributes proof protocols in an anonymous and unlinkable fashion. The core idea is issuing anonymous credentials for each single attribute and proving relations over attributes by selectively aggregating individual anonymous credentials. A selective aggregate Camenisch-Lysyanskaya (CL)-signature scheme is presented to construct anonymous credentials. It is existentially unforgeable against adaptively chosen-message attack under CL-signature scheme on the Lysyanskaya-Rivest-Sahai-Wolf assumption. It has constant complexity in verification of multiple signatures. Users can select which attributes and the corresponding individual anonymous credentials are involved in the proof. They can prove the possession of attributes over logic relations including AND and OR, and the possession of a single attribute over comparison relations including inequality to a given value and belonging to a given interval. The efficiency analysis shows that the resulting protocols have advantages in computation cost; the AND relation proof and comparison relation proofs have constant complexity w.r.t. the number of attributes, and the OR relation proof has linear complexity only w.r.t. the number of attributes as required.
引用
收藏
页码:273 / 288
页数:16
相关论文
共 22 条
[1]  
[Anonymous], P 7 ACM WORKSH DIG I
[2]  
Begum N., 2012, INT C INF SECUR CRYP, P495
[3]   Multifactor Identity Verification Using Aggregated Proof of Knowledge [J].
Bhargav-Spantzel, Abhilasha ;
Squicciarini, Anna Cinzia ;
Xue, Rui ;
Bertino, Elisa .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (04) :372-383
[4]  
Bjones Ronny, 2014, Privacy Technologies and Policy. First Annual Privacy Forum, APF 2012. Revised Selected Papers: LNCS 8319, P111, DOI 10.1007/978-3-642-54069-1_7
[5]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[6]  
Boudot F, 2000, LECT NOTES COMPUT SC, V1807, P431
[7]  
Camenisch J, 2004, LECT NOTES COMPUT SC, V3152, P56
[8]   Efficient Attributes for Anonymous Credentials [J].
Camenisch, Jan ;
Gro, Thomas .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (01)
[9]  
Camenisch J, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P345
[10]  
Camenisch J, 2009, LECT NOTES COMPUT SC, V5443, P481