一个可追踪身份的基于属性签名方案
作者:

Identity Traceable Attribute-Based Signature Scheme
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [24]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    基于属性的签名(attribute-based signature,简称ABS)方案可以隐藏签名者的身份.为了防止签名者滥用签名,Escala,Herranz 和Morillo 提出了一种可追踪签名者身份的基于属性签名方案(EHM-ABS),其中使用了自同构签名,并多次使用了非交互证据不可区分(non-interactive witness indistinguishable,简称NIWI)的证明.在Boyen 和Waters 的基于ID 的紧致群签名方案的基础上,在标准模型下提出了一种可追踪身份的ABS 方案.在颁发属性私钥时嵌入签名者的身份,并对身份使用比特加密的NIWI 证明来实现可追踪性.与EHM-ABS 相比,当声明的属性集合的阶大于ID 的比特长度的1/4 时,该方案减少了使用NIWI 证明的次数,且无须使用自同构签名.该方案的安全性基于子群判定假设和CDH 假设.

    Abstract:

    In an attribute-based signature (ABS) scheme, the signer’s identity keeps anonymous. To prevent the signer from abusing this property, Escala, Herranz, and Morillo proposed an identity traceable attribute-based signature scheme (EHM-ABS). Their scheme used an automorphic signature, and applied the non-interactive witness indistinguishable (NIWI) proofs many times. Inspired by Boyen, and Waters’ identity-based compact group signature scheme, the study presents an identity traceable ABS scheme in the standard model. When issuing the attribute private key, the signer’s identity is embedded. By using the NIWI proof of encrypting each bit of identity, this scheme achieves the traceability. To compare with EHM-ABS, this scheme reduces the number of applying the NIWI proofs when the order of the claimed attributes set is bigger than the quarter of the bit length of identity, and do not need to use automorphic signature. The security of this proposed scheme is based on the subgroup dicision and the computational diffie-Hellman assumptions.

    参考文献
    [1] Sahai A, Waters B. Fuzzy identity based encryption. In: Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg:Springer-Verlag, 2005. 457-473.
    [2] Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. ofthe 13th ACM Conf. on Computer and Communications Security (CCS 2006). New York: ACM Press, 2006. 89-98. [doi:10.1145/1180405.1180418]
    [3] Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Proc. of the 2007 IEEE Symp. on Security andPrivacy. Washington: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]
    [4] Ostrovsky R, Sahai A, Waters B. Attribute-Based encryption with non-monotonic access structures. In: Proc. of the 14th ACMConf. on Computer and Communications Security (CCS 2007). New York: ACM Press, 2007. 195- 203. [doi:10.1145/1315245.1315270]
    [5] Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Proc. of the 14th ACM Conf. on Computer and CommunicationsSecurity (CCS 2007). New York: ACM Press, 2007. 456-465. [doi: 10.1145/1315245.1315302]
    [6] Su JS, Cao D, Wang XF, Sun YP, Hu QL. Attribute-Based encryption schemes. Journal of Software, 2011,22(6):1299-1315 (inChinese with English abstract). http://www.jos.org.cn/1000-9825/3993.htm [doi: 10.3724/SP.J.1001.2011.03993]
    [7] Yang P, Cao Z, Dong X. Fuzzy identity based signature with applications to biometric authentication. Computers & ElectricalEngineering, 2011,37(4):532-540. [doi: 10.1016/j.compeleceng.2011.04.013]
    [8] Emura K, Miyaji A, Omote K. A dynamic attribute-based group signature scheme and its application in an anonymous survey forthe collection of attribute statistics. Journal of Information Processing, 2009,17:216-231. [doi: s10.2197/ipsjjip.17.216]
    [9] Shahandashti SF, Safavi-Naini R. Threshold attribute-based signatures and their application to anonymous credential systems. In:Proc. of the Progress in Cryptology-AFRICACRYPT 2009. Berlin, Heidelberg: Springer-Verlag, 2009. 198-216. [doi:10.1145/1755688.1755697]
    [10] Li J, Kim K. Hidden attribute-based signatures without anonymity revocation. Information Sciences, 2010,180:1681-1689. [doi:10.1016/j.ins.2010.01.008]
    [11] Li J, Au MH, Susilo W, Xie D, Ren K. Attribute-Based signature and its applications. In: Proc. of the 5th ACM Symp. onInformation, Computer and Communications Security (ASIACCS 2010). New York: ACM Press, 2010. 60-69. [doi:10.1145/1755688.1755697]
    [12] Gagné M, Narayan S, Safavi-Naini R. Threshold attribute-based signcryption. In: Proc. of 7th Conf. on Security and Cryptographyfor Networks. Berlin, Heidelberg: Springer-Verlag, 2010. 154-171. [doi: 10.1007/978-3-642-15317-4_11]
    [13] Maji HK, Prabhakaran M, Rosulek M. Attribute-Based signatures. In: Proc. of the Topics in Cryptology-CT-RSA 2011. Berlin,Heidelberg: Springer-Verlag, 2011. 376-392. [doi: 10.1007/978-3-642-19074-2_24]
    [14] Escala à, Herranz J, Morillo P. Revocable attribute-based signatures with adaptive security in the standard model. In: Proc. of theProgress in Cryptology-AFRICACRYPT 2011. Berlin, Heidelberg: Springer-Verlag, 2011. 224-241. [doi: 10.1007/978-3-642-21969-6_14]
    [15] Groth J, Ostrovsky R, Sahai A. Perfect non-interactive zero knowledge for NP. In: Proc. of the Advances in Cryptology-EUROCRYPT 2006. Berlin, Heidelberg: Springer-Verlag, 2006. 339-358. [doi: 10.1007/11761679_21]
    [16] Abe M, Fuchsbauer G, Groth J, Haralambiev K, Ohkubo M. Structure-Preserving signatures and commitments to group elements.In: Advances in Cryptology-CRYPTO 2010. Berlin, Heidelberg: Springer-Verlag, 2010. 209-236. [doi: 10.1007/978-3-642-14623-7_12]
    [17] Groth J, Sahai A. Efficient non-interactive proof systems for bilinear groups. In: Advances in Cryptology-EUROCRYPT 2008.Berlin, Heidelberg: Springer-Verlag, 2008. 415-432. [doi: 10.1007/978-3-540-78967-3_24]
    [18] Petersen H. How to convert any digital signature scheme into a group signature scheme. In: Proc. of the 5th Int’l Workshop onSecurity Protocols. Berlin, Heidelberg: Springer-Verlag, 1997. 177-190.
    [19] Bellare M, Micciancio D, Warinschi B. Foundations of group signatures: Formal definitions, simplified requirements, and aconstruction based on general assumptions. In: Advances in Cryptology-EUROCRYPT 2003. Berlin, Heidelberg: Springer-Verlag,2003. 614-629. [doi: 10.1007/3-540-39200-9_38]
    [20] Boyen X, Waters B. Compact group signatures without random oracles. In: Advances in Cryptology-EUROCRYPT 2006. Berlin,Heidelberg: Springer-Verlag, 2006. 427-444. [doi: 10.1007/11761679_26]
    [21] Boneh D, Goh EJ, Nissim K. Evaluating 2-DNF formulas on ciphertexts. In: Proc. of the 2nd Theory of Cryptography Conf. (TCC2005). Berlin, Heidelberg: Springer-Verlag, 2005. 325-341. [doi: 10.1007/978-3-540-30576-7_18]
    [22] Beimel A. Secure schemes for secret sharing and key distribution [Ph.D. Thesis]. Haifa: Israel Institute of Technology, 1996.
    [23] Waters B. Efficient identity-based encryption without random oracles. In: Advances in Cryptology-EUROCRYPT 2005. Berlin,Heidelberg: Springer-Verlag, 2005. 114-127. [doi: 10.1007/11426639_7]
    [24] Paterson KG, Schuldt JCN. Efficient identity-based signatures secure in the standard mode. In: Proc. of the11th Australasian Conf.on Information Security and Privacy (ACISP 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 207-222. [doi: 10.1007/11780656_18]
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

张秋璞,徐震,叶顶锋.一个可追踪身份的基于属性签名方案.软件学报,2012,23(9):2449-2464

复制
分享
文章指标
  • 点击次数:4268
  • 下载次数: 7695
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2011-07-04
  • 最后修改日期:2011-12-21
  • 在线发布日期: 2012-09-05
文章二维码
您是第19938597位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号