File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Attribute-based signature and its applications

TitleAttribute-based signature and its applications
Authors
Keywordscomputational Diffie-Hellman assumption
anonymity
attribute-based
predicate
signature
Issue Date2010
Citation
Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010, 2010, p. 60-69 How to Cite?
AbstractIn an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to the identity of the individual who signed a message, but a claim regarding the attributes the underlying signer possesses. In ABS, users cannot forge signatures with attributes they do not possess even through colluding. On the other hand, a legitimate signer remains anonymous without the fear of revocation and is indistinguishable among all the users whose attributes satisfying the predicate specified in the signature. ABS is useful in many important applications such as anonymous authentication and attribute-based messaging systems. In this paper, we propose two efficient ABS constructions supporting flexible threshold predicate by exploring a new technique for signature signing. Compared with existed schemes, the new constructions provide better efficiency in terms of both the computational cost and signature size. The first new construction is provably secure in the random oracle model, while the second construction does not rely on the random oracle assumption. To further reduce the trust on attribute authority, we also show an ABS construction with multiple attribute authorities. It is worth noting that the security of all the proposed constructions is not relying on generic group. As an illustrative application, we construct an efficient non-transferable access control system from ABS. © 2010 ACM.
Persistent Identifierhttp://hdl.handle.net/10722/280476

 

DC FieldValueLanguage
dc.contributor.authorLi, Jin-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorXie, Dongqing-
dc.contributor.authorRen, Kui-
dc.date.accessioned2020-02-17T14:34:08Z-
dc.date.available2020-02-17T14:34:08Z-
dc.date.issued2010-
dc.identifier.citationProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010, 2010, p. 60-69-
dc.identifier.urihttp://hdl.handle.net/10722/280476-
dc.description.abstractIn an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to the identity of the individual who signed a message, but a claim regarding the attributes the underlying signer possesses. In ABS, users cannot forge signatures with attributes they do not possess even through colluding. On the other hand, a legitimate signer remains anonymous without the fear of revocation and is indistinguishable among all the users whose attributes satisfying the predicate specified in the signature. ABS is useful in many important applications such as anonymous authentication and attribute-based messaging systems. In this paper, we propose two efficient ABS constructions supporting flexible threshold predicate by exploring a new technique for signature signing. Compared with existed schemes, the new constructions provide better efficiency in terms of both the computational cost and signature size. The first new construction is provably secure in the random oracle model, while the second construction does not rely on the random oracle assumption. To further reduce the trust on attribute authority, we also show an ABS construction with multiple attribute authorities. It is worth noting that the security of all the proposed constructions is not relying on generic group. As an illustrative application, we construct an efficient non-transferable access control system from ABS. © 2010 ACM.-
dc.languageeng-
dc.relation.ispartofProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010-
dc.subjectcomputational Diffie-Hellman assumption-
dc.subjectanonymity-
dc.subjectattribute-based-
dc.subjectpredicate-
dc.subjectsignature-
dc.titleAttribute-based signature and its applications-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1145/1755688.1755697-
dc.identifier.scopuseid_2-s2.0-77954473455-
dc.identifier.spage60-
dc.identifier.epage69-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats