Multi-Authority Attribute-Based Alterable Threshold Ring Signature without Central Authority
Author:
Affiliation:

Fund Project:

Sichuan Science and Technology Program (2017GZDZX0002, 2018GZ0195, 2017SZYZF0002); National Natural Science Foundation of China (61872302, 61371098); Project Fund for the Center of National Railway Intelligent Transportation System Engineering and Technology (RITS2018KF02)

  • Article
  • | |
  • Metrics
  • |
  • Reference [29]
  • |
  • Related
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    Attribute based ring signature has gradually become a hot topic in the related field, owing to its priorities including strong in expressive power, flexible in use, and easy to hide the identity of signer. By analyzing existing attribute-based ring signature schemes, it can be found that the majority of earlier schemes cannot resist the collusion attack with the premise of unconditional strong anonymity, and there are many issues such as attribute key escrow, fixed threshold and inefficient verification. To address the above defects, this paper firstly introduces the formal definitions and security model for the multi-authority attribute-based threshold ring signature scheme. Then a multi-authority attribute-based variable threshold ring signature scheme is presented. This scheme uses distributed key generation protocol to constrain the rights of attribute authority, and to overcome the problem of attribute key escrow. Through embedding a random identity factor in each user's attribute key, and introducing a random fuzzy parameter in each signature, the scheme can provides both unconditional strong anonymity and collusion resistance. In addition, a batch verification algorithm is proposed to reduce the computation complexity of verification from nO(·) to O(·)+n. Under random oracle model and computational Diffie-Hellman assumption, the proposal can be proven to be existentially unforgeable and can resist collusion attacks launched by the malicious users with the complementary attributes in chosen message and predicate attack.

    Reference
    [1] Sahai A, Waters B. Fuzzy identity-based encryption. In:Proc. of the 24th Annual Int'l Conf. on Theory and Applications of Cryptographic Techniques. Berlin:Springer-Verlag, 2005. 457-473.[doi:10.1007/11426639_27]
    [2] Attrapadung N, Libert B, De Panafieu E. Expressive key-policy attribute-based encryption with constant-size ciphertexts. In:Proc. of the 14th Int'l Conf. on Practice and Theory in Public Key Cryptography (PKC 2011). Berlin:Springer-Verlag, 2011. 90-108.[doi:10.1007/978-3-642-19379-8_6]
    [3] Han F, Qin J, Zhao H, Hu J. A general transformation from KP-ABE to searchable encryption. Future Generation Computing Systems, 2014,30(1):107-115.[doi:10.1016/j.future.2013.09.013]
    [4] Rouselakis Y, Waters B. Practical constructions and new proof methods for large universe attribute-based encryption. In:Proc. of the 2013 ACM SIGSAC Conf. on Computer and Communications Security. Berlin:ACM Press, 2013. 463-474.[doi:10.1145/2508859.2516672]
    [5] Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In:Proc. of the 2007 IEEE Symp. on Security and Privacy (SP 2007). Berkeley:IEEE Press, 2007. 321-334.[doi:10.1109/SP.2007.11]
    [6] Goyal V, Jain A, et al. Bounded ciphertext policy attribute based encryption. In:Proc. of the 35th Int'l Colloquium on Automata, Languages and Programming. Berlin:Springer-Verlag, 2008. 579-591.[doi:10.1007/978-3-540-70583-3_47]
    [7] Hong H, Sun Z, Liu X. A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud. KSⅡ Trans. on Internet and Information Systems, 2016,10(5):2394-2406.[doi:10.3837/tiis.2016.05.024]
    [8] Burnett A, Duffy A, Dowling T. A biometric identity based signature scheme. 2004. http://eprint.iacr.org/2004/176
    [9] Guo SQ, Zeng YP. Attribute-Based signature scheme. In:Proc. of the 2nd Int'l Conf. on Information Security and Assurance. Busan. IEEE Press, 2008. 509-511.[doi:10.1109/ISA.2008.111]
    [10] Maji H, Prabhakaran M, Rosulek M. Attribute-Based signatures:Achieving attribute privacy and collusion-resistance. 2008. http://eprint.iacr.org/2008/328
    [11] Rivest R, Shamir A, Tauman Y. How to leak a secret. In:Proc. of the Advances in Cryptology (ASIACRYPT 2001). Gold Coast:Springer-Verlag, 2001. 552-565.[doi:10.1007/3-540-45682-1_32]
    [12] Li J, Kim K. Attribute-Based ring signatures. 2008. http://eprint.iacr.org/2008/394
    [13] Li J, Kim K. Hidden attribute-based signatures without anonymity revocation. Information Sciences, 2010,180(9):1681-1689.[doi:http://dx.doi.org/10.1016/j.ins.2010.01.008]
    [14] Shahandashti SF, Safavi-Naini R. Threshold attribute-based signatures and their application to anonymous credential systems. In:Proc. of the Cryptology-Africacrypt 2009, Vol.5580. Berlin:Springer-Verlag, 2009. 198-216.[doi:10.1007/978-3-642-02384-2_13]
    [15] Wang WQ, Chen SZ. An efficient attribute-based ring signature scheme. In:Proc. of the Int'l Forum on Computer ScienceTechnology and Applications, Vol.1. Chongqing:IEEE Press, 2009. 147-150.[doi:10.1109/IFCSTA.2009.43]
    [16] Toluee R, Asaar MR, Salmasizadeh M. Attribute-Based ring signatures:Security analysis and a new construction. In:Proc. of the 10th Int'l ISC Conf. on Information Security and Cryptology (ISCISC). IEEE Press, 2014. 1-6.[doi:10.1109/ISCISC.2013. 6767342]
    [17] Li J, Au MH, Susilo W, et al. Attribute-Based signatures and its applications. In:Proc. of the 5th ACM Symp. on Information, Computer and Communications Security (ASIACCS 2010). Beijing:ACM Press, 2010. 978-987.
    [18] Wang WQ, Chen SZ. Attribute-Based ring signature scheme with constant-size signature. IET Information Security, 2010,4(2):104-110.[doi:10.1049/iet-ifs.2009.0189]
    [19] Ge AJ, Ma CG, Zhang ZF. Attribute-Based signature scheme with constant size signature in the standard model. Journal of IET Information Security, 2012,6(2):47-54.[doi:10.1049/iet-ifs.2011.0094]
    [20] Chen Z, Zhang WF, Wang XM. Attribute-Based alterable threshold ring signature scheme with conspiracy attack immunity. Journal on Communications, 2015,36(12):212-222(in Chinese with English abstract).
    [21] Li J, Chen XF, Huang XY. New attribute-based authentication and its application in anonymous cloud access service. Int'l Journal of Web and Grid Services, 2015,11(1):125-141.[doi:http://dx.doi.org/10.1504/IJWGS.2015.067161]
    [22] Chase M. Multi-Authority attribute based encryption. In:Proc. of the 4th Theory of Cryptography Conf. Berlin:Springer-Verlag, 2007. 515-534.[doi:10.1007/978-3-540-70936-7_28]
    [23] Chase M, Chow S. Improving privacy and security in multi-authority attribute-based encryption, In:Proc. of the 16th ACM Conf. on Computer and Communications Security. Chicago:ACM Press, 2009. 121-130.[doi:10.1145/1653662.1653678]
    [24] Lin H, Cao ZF, Liang XH, et al. Secure threshold multi-authority attribute based encryption without a central authority. Journal of Information Sciences, 2010,180(13):2618-2632.[doi:http://doi.org/10.1016/j.ins.2010.03.004]
    [25] Sun CX, Ma WP, Chen HF. Provable secure multi-authority attribute-based signature without a central authority. Journal of University of Electronic Science and Technology of China, 2012,41(4):552-556(in Chinese with English abstract).
    [26] Ferrara A, Green M, Hohenberger S, Pedersen M. Practical short signature batch verification. 2008. http://eprint.iacr.org/2008/015
    附中文参考文献:
    [20] 陈桢,张文芳,王小敏.基于属性的抗合谋攻击可变门限环签名方案.通信学报,2015,36(12):212-222.
    [25] 孙昌霞,马文平,陈和风.可证明安全的无中心授权的多授权属性签名.电子科技大学学报,2012,41(4):552-556.
    Related
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

旭东,张文芳,王小敏.分布式无中心授权的属性基可变门限环签名.软件学报,2018,29(11):3528-3543

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:January 10,2017
  • Revised:March 13,2017
  • Online: April 16,2018
You are the first2043805Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063