用户名: 密码: 验证码:
Revocable Threshold Attribute-Based Signature against Signing Key Exposure
详细信息    查看全文
  • 作者:Jianghong Wei (15)
    Xinyi Huang (16)
    Xuexian Hu (15)
    Wenfen Liu (15)

    15. State Key Laboratory of Mathematical Engineering and Advanced Computing
    ; Zhengzhou ; 450002 ; China
    16. School of Mathematics and Computer Science
    ; Fujian Normal University ; Fuzhou ; 350007 ; China
  • 关键词:Attribute ; based signature ; revocation ; signing key exposure
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2015
  • 出版时间:2015
  • 年:2015
  • 卷:9065
  • 期:1
  • 页码:316-330
  • 全文大小:296 KB
  • 参考文献:1. Attrapadung, N., Imai, H. Attribute-based encryption supporting direct/Indirect revocation modes. In: Parker, M.G. eds. (2009) Cryptography and Coding. Springer, Heidelberg, pp. 278-300 CrossRef
    2. Boldyreva, A., Goyal, V., Kumar, V.: Id-based encryption with efficient revocation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 417鈥?26 (2008)
    3. Boneh, D., Franklin, M. Identity-based encryption from the weil pairing. In: Kilian, J. eds. (2001) Advances in Cryptology - CRYPTO 2001. Springer, Heidelberg, pp. 213-229 CrossRef
    4. Boneh, D., Gentry, C., Waters, B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. eds. (2005) Advances in Cryptology 鈥?CRYPTO 2005. Springer, Heidelberg, pp. 258-275 CrossRef
    5. Gentry, C. Certificate-based encryption and the certificate revocation problem. In: Biham, E. eds. (2003) Advances in Cryptology 鈥?EUROCRPYT 2003. Springer, Heidelberg, pp. 272-293 CrossRef
    6. Herranz, J., Laguillaumie, F., Libert, B., R脿fols, C. Short attribute-based signatures for threshold predicates. In: Dunkelman, O. eds. (2012) Topics in Cryptology 鈥?CT-RSA 2012. Springer, Heidelberg, pp. 51-67 CrossRef
    7. Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based signature and its applications. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 60鈥?9. ACM (2010)
    8. Lian, Y., Xu, L., Huang, X.: Attribute-based signatures with efficient revocation. In: 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 573鈥?77. IEEE (2013)
    9. Libert, B., Vergnaud, D. Adaptive-ID secure revocable identity-based encryption. In: Fischlin, M. eds. (2009) Topics in Cryptology 鈥?CT-RSA 2009. Springer, Heidelberg, pp. 1-15 CrossRef
    10. Maji, H.K., Prabhakaran, M., Rosulek, M. Attribute-based signatures. In: Kiayias, A. eds. (2011) Topics in Cryptology 鈥?CT-RSA 2011. Springer, Heidelberg, pp. 376-392 CrossRef
    11. Naor, M., Nissim, K. (2000) Certificate revocation and certificate update. IEEE Journal on Selected Areas in Communications 18: pp. 561-570 CrossRef
    12. Okamoto, T., Takashima, K. Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. eds. (2011) Public Key Cryptography 鈥?PKC 2011. Springer, Heidelberg, pp. 35-52 CrossRef
    13. Sahai, A., Seyalioglu, H., Waters, B. Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. eds. (2012) Advances in Cryptology 鈥?CRYPTO 2012. Springer, Heidelberg, pp. 199-217 CrossRef
    14. Sahai, A., Waters, B. Fuzzy identity-based encryption. In: Cramer, R. eds. (2005) Advances in Cryptology 鈥?EUROCRYPT 2005. Springer, Heidelberg, pp. 457-473 CrossRef
    15. Seo, J.H., Emura, K. Revocable identity-based encryption revisited: Security model and construction. In: Kurosawa, K., Hanaoka, G. eds. (2013) Public-Key Cryptography 鈥?PKC 2013. Springer, Heidelberg, pp. 216-234 CrossRef
    16. Shahandashti, S.F., Safavi-Naini, R. Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. eds. (2009) Progress in Cryptology 鈥?AFRICACRYPT 2009. Springer, Heidelberg, pp. 198-216 CrossRef
    17. Shamir, A. Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. eds. (1985) Advances in Cryptology. Springer, Heidelberg, pp. 47-53 CrossRef
    18. Waters, B. Efficient identity-based encryption without random oracles. In: Cramer, R. eds. (2005) Advances in Cryptology 鈥?EUROCRYPT 2005. Springer, Heidelberg, pp. 114-127 CrossRef
  • 作者单位:Information Security Practice and Experience
  • 丛书名:978-3-319-17532-4
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
文摘
For a cryptosystem with a large number of users, it is necessary to provide an efficient revocation mechanism to preserve the security of whole system. In this paper, we aim to provide a scalable revocation mechanism for attribute-based signature (ABS). Specifically, we first formally define the syntax of revocable ABS (RABS), followed with a corresponding security model that considers a realistic threat called signing key exposure. Then, built on the ideas of an ABS scheme and binary data structure, we present a concrete construction of RABS with signing key exposure resistance. Finally, the proposed scheme is proved to be existentially unforgeable under adaptively chosen message attacks in the selective-predicate model, without random oracles. In addition to the necessary revocation functionality, the proposed scheme remains efficient in terms of storage cost and computation complexity.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700