Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems

被引:0
|
作者
Shahandashti, Siamak F. [1 ]
Safavi-Naini, Reihaneh [2 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[2] Univ Calgary, Dept Comp Sci, Calgary, AB T2N 1N4, Canada
来源
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009 | 2009年 / 5580卷
关键词
IDENTITY-BASED ENCRYPTION; KNOWLEDGE; PROOFS; SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we propose threshold attribute-based signatures (t-ABS). A t-ABS scheme enables a signature holder to prove possession of signatures by revealing only the relevant attributes of the signer, hence providing signer-attribute privacy for the signature holder. We define t-ABS schemes, formalize their security and propose two t-ABS schemes: a basic scheme secure against selective forgery and a second one secure against existential forgery, both provable in the standard model, assuming hardness of the CDH problem. We show that our basic t-ABS scheme can be augmented with two extra protocols that are used for efficiently issuing and verifying t-ABS signatures on committed values. We call the augmented scheme a threshold attribute based c-signature scheme (t-ABCS). We show how a t-ABCS scheme can be used to realize a secure threshold attribute-based anonymous credential system (t-ABACS) providing issuer-attribute privacy. We propose a security model for t-ABACS, give a concrete scheme using t-ABCS scheme, and prove that the credential system is secure if the t-ABCS scheme is secure.
引用
收藏
页码:198 / +
页数:3
相关论文
共 50 条
  • [41] Threshold Attribute-Based Credentials With Redactable Signature
    Shi, Rui
    Feng, Huamin
    Yang, Yang
    Yuan, Feng
    Li, Yingjiu
    Pang, Hwee Hwa
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3751 - 3765
  • [42] Threshold Attribute-Based Signcryption in Standard Model
    Zheng, Haibin
    Qin, Jing
    Hu, Jiankun
    Wu, Qianhong
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 187 - 193
  • [43] Secure attribute-based systems
    Pirretti, Matthew
    Traynor, Patrick
    McDaniel, Patrick
    Waters, Brent
    JOURNAL OF COMPUTER SECURITY, 2010, 18 (05) : 799 - 837
  • [44] Threshold attribute-based signature and its security
    Ma, Chun-Guang
    Shi, Lan
    Zhou, Chang-Li
    Wang, Ding
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2013, 41 (05): : 1012 - 1015
  • [45] Improving efficiency and security of Camenisch-Lysyanskaya signatures for anonymous credential systems
    Loh, Jia-Chng
    Guo, Fuchun
    Susilo, Willy
    COMPUTER STANDARDS & INTERFACES, 2025, 91
  • [46] Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks
    Zeng, Yongbin
    Guang, Hui
    Li, Guangsong
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [47] Attribute-Based Signatures for Circuits from Bilinear Map
    Sakai, Yusuke
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 283 - 300
  • [48] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [49] Fully Anonymous Attribute-Based Encryption with Privacy and Access Privilege
    Kartik
    Chandrasekhar, B. N.
    Lakshmi, H.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 416 - 418
  • [50] Anonymous Attribute-Based Searchable Encryption for Smart Health System
    Rajan Mehla
    Ritu Garg
    SN Computer Science, 5 (7)