File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/1755688.1755697
- Scopus: eid_2-s2.0-77954473455
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Attribute-based signature and its applications
Title | Attribute-based signature and its applications |
---|---|
Authors | |
Keywords | computational Diffie-Hellman assumption anonymity attribute-based predicate signature |
Issue Date | 2010 |
Citation | Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010, 2010, p. 60-69 How to Cite? |
Abstract | In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to the identity of the individual who signed a message, but a claim regarding the attributes the underlying signer possesses. In ABS, users cannot forge signatures with attributes they do not possess even through colluding. On the other hand, a legitimate signer remains anonymous without the fear of revocation and is indistinguishable among all the users whose attributes satisfying the predicate specified in the signature. ABS is useful in many important applications such as anonymous authentication and attribute-based messaging systems. In this paper, we propose two efficient ABS constructions supporting flexible threshold predicate by exploring a new technique for signature signing. Compared with existed schemes, the new constructions provide better efficiency in terms of both the computational cost and signature size. The first new construction is provably secure in the random oracle model, while the second construction does not rely on the random oracle assumption. To further reduce the trust on attribute authority, we also show an ABS construction with multiple attribute authorities. It is worth noting that the security of all the proposed constructions is not relying on generic group. As an illustrative application, we construct an efficient non-transferable access control system from ABS. © 2010 ACM. |
Persistent Identifier | http://hdl.handle.net/10722/280476 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Li, Jin | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Xie, Dongqing | - |
dc.contributor.author | Ren, Kui | - |
dc.date.accessioned | 2020-02-17T14:34:08Z | - |
dc.date.available | 2020-02-17T14:34:08Z | - |
dc.date.issued | 2010 | - |
dc.identifier.citation | Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010, 2010, p. 60-69 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280476 | - |
dc.description.abstract | In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to the identity of the individual who signed a message, but a claim regarding the attributes the underlying signer possesses. In ABS, users cannot forge signatures with attributes they do not possess even through colluding. On the other hand, a legitimate signer remains anonymous without the fear of revocation and is indistinguishable among all the users whose attributes satisfying the predicate specified in the signature. ABS is useful in many important applications such as anonymous authentication and attribute-based messaging systems. In this paper, we propose two efficient ABS constructions supporting flexible threshold predicate by exploring a new technique for signature signing. Compared with existed schemes, the new constructions provide better efficiency in terms of both the computational cost and signature size. The first new construction is provably secure in the random oracle model, while the second construction does not rely on the random oracle assumption. To further reduce the trust on attribute authority, we also show an ABS construction with multiple attribute authorities. It is worth noting that the security of all the proposed constructions is not relying on generic group. As an illustrative application, we construct an efficient non-transferable access control system from ABS. © 2010 ACM. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010 | - |
dc.subject | computational Diffie-Hellman assumption | - |
dc.subject | anonymity | - |
dc.subject | attribute-based | - |
dc.subject | predicate | - |
dc.subject | signature | - |
dc.title | Attribute-based signature and its applications | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/1755688.1755697 | - |
dc.identifier.scopus | eid_2-s2.0-77954473455 | - |
dc.identifier.spage | 60 | - |
dc.identifier.epage | 69 | - |