An efficient attribute-based signature scheme with claim-predicate mechanism

被引:0
作者
Wang, Changji [1 ,2 ]
Li, Wentao [1 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Dept Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] South China Normal Univ, Res Ctr Software Technol Informat Serv, Guangzhou 501631, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute-based encryption; attribute-based signature; perfect privacy; existential; unforgeability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-Based Signature (ABS) is a promising cryptographic primitive that allows a signer to sign a message under a signing policy to convince the verifier that the signer holds a subset of attributes satisfying the signing predicate. A successful execution of ABS should leak no information about the identity of the signer or the attributes he possesses, other than the fact these attributes that the underlying signer possesses satisfy the given signing predicate. ABS has a lot of applications in real scenarios requiring both authentication and privacy properties, such as anonymous authentication and attribute-based messaging systems. In this paper, we present a new construction of ABS with claim-predicate mechanism based on Bethencourt et al.' s ciphertext-policy attribute-based encryption scheme. The proposed construction is proved to be existentially unforgeable in the random oracle model for the selective adversary and can achieve perfect privacy. Compared with existing schemes, the new construction provides better efficiency in terms of both the computational cost and signature size.
引用
收藏
页码:151 / 159
页数:9
相关论文
共 20 条
[1]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[2]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[4]  
Boyen X, 2007, LECT NOTES COMPUT SC, V4515, P210
[5]  
Chen L.Q, 2007, LNCS, V4677, P183
[6]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[7]  
Goyal V., 2006, PROC 13 ACM C COMPUT, P89
[8]  
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
[9]   Attribute-based signature scheme [J].
Guo Shaniqng ;
Zeng Yingpei .
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, :509-+
[10]  
Khader D., 2007, IACR CRYPTOLOGY EPRI, V2007, P241