Computer Science ›› 2015, Vol. 42 ›› Issue (2): 142-146.doi: 10.11896/j.issn.1002-137X.2015.02.031

Previous Articles     Next Articles

Attribute-based Signatures with Auditabiling in Standard Model

REN Yan   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In an ABS scheme,the attribute authority (A-authority) generates the private key for any users,hence it has to be completely trusted.The A-authority is free to engage in malicious activities without any risk of being confronted in a court of law.Motivated by this,we firstly proposed a notion of audit attribute-based signature scheme.It is not only a variant of ABS,but also a new approach to mitigate the key escrow problem.Then we constructed a audit attribute-based signature scheme in the standard model.Finally,we proved its security under the standard model.

Key words: Attribute-based signature,Audit,Standard model

[1] Sahai A,Waters B.Fuzzy identity-based encryption[M]∥Ad-vances in Cryptology-EUROCRYPT 2005.Springer Berlin Heidelberg,2005:457-473
[2] Yang P,Cao Z,Dong X.Fuzzy Identity Based Signature with applications to biometric authentication[J].Computer Electrical Engineering,2011,7(4):532-540
[3] Shaniqng G,Yingpei Z.Attribute-based signature scheme[C]∥International Conference on Information Security and Assurance,2008(ISA 2008).IEEE,2008:509-511
[4] Li J,Kim K.Hidden attribute-based signatures without anonym-ity revocation[J].Information Sciences,2010,180(9):1681-1689
[5] Li J,Au M H,Susilo W,et al.Attribute-based signature and its applications[C]∥Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security.ACM,2010:60-69
[6] Escala A,Herranz J,Morillo P.Revocable attribute-based signatures with adaptive security in the standard model[M]∥Progress in Cryptology-AFRICACRYPT 2011.Springer Berlin Heidelberg,2011:224-241
[7] Maji H K,Prabhakaran M,Rosulek M.Attribute-Based Signatures:Achieving Attribute-Privacy and Collusion-Resistance.http://eprint.iacr.org/2008/328.pdf
[8] Khader D.Attribute Based Group Signatures.http://eprint.iacr.org/2007/159.pdf
[9] Khader D.Attribute Based Group Signature with Revocation.http://eprint.iacr.org/2007/241.pdf
[10] Li J,Kim K.Attribute-Based Ring Signatures.http://epring.iacr.org/2008/394.pdf
[11] Li J,Huang Q,Chen X,et al.Multi-authority ciphertext-policy attribute-based encryption with accountability[C]∥Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security.ACM,2011:386-390
[12] Shahandashti S F,Safavi-Naini R.Threshold attribute-based signatures and their application to anonymous credential systems[M]∥Progress in Cryptology-AFRICACRYPT 2009.Springer Berlin Heidelberg,2009:198-216
[13] Maji H K,Prabhakaran M,Rosulek M.Attribute-based signatures[M]∥Topics in Cryptology-CT-RSA 2011.Springer Berlin Heidelberg,2011:376-392
[14] Okamoto T,Takashima K.Efficient attribute-based signa-tures for non-monotone predicates in the standard model[M]∥Public Key Cryptography-PKC 2011.Springer Berlin Heidelberg,2011:35-52
[15] Goyal V.Reducing trust in the PKG in identity based cryptosystems[M]∥Advances in Cryptology-CRYPTO 2007.Springer Berlin Heidelberg,2007:430-447

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!