Multi-Authority Attribute-Based Alterable Threshold Ring Signature without Central Authority
Author:
Affiliation:

Clc Number:

Fund Project:

Sichuan Science and Technology Program (2017GZDZX0002, 2018GZ0195, 2017SZYZF0002); National Natural Science Foundation of China (61872302, 61371098); Project Fund for the Center of National Railway Intelligent Transportation System Engineering and Technology (RITS2018KF02)

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Attribute based ring signature has gradually become a hot topic in the related field, owing to its priorities including strong in expressive power, flexible in use, and easy to hide the identity of signer. By analyzing existing attribute-based ring signature schemes, it can be found that the majority of earlier schemes cannot resist the collusion attack with the premise of unconditional strong anonymity, and there are many issues such as attribute key escrow, fixed threshold and inefficient verification. To address the above defects, this paper firstly introduces the formal definitions and security model for the multi-authority attribute-based threshold ring signature scheme. Then a multi-authority attribute-based variable threshold ring signature scheme is presented. This scheme uses distributed key generation protocol to constrain the rights of attribute authority, and to overcome the problem of attribute key escrow. Through embedding a random identity factor in each user's attribute key, and introducing a random fuzzy parameter in each signature, the scheme can provides both unconditional strong anonymity and collusion resistance. In addition, a batch verification algorithm is proposed to reduce the computation complexity of verification from nO(·) to O(·)+n. Under random oracle model and computational Diffie-Hellman assumption, the proposal can be proven to be existentially unforgeable and can resist collusion attacks launched by the malicious users with the complementary attributes in chosen message and predicate attack.

    Reference
    Related
    Cited by
Get Citation

旭东,张文芳,王小敏.分布式无中心授权的属性基可变门限环签名.软件学报,2018,29(11):3528-3543

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:January 10,2017
  • Revised:March 13,2017
  • Adopted:
  • Online: April 16,2018
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063