期刊文献+

Attribute-Based Signature with Policy-and-Endorsement Mechanism 被引量:1

Attribute-Based Signature with Policy-and-Endorsement Mechanism
原文传递
导出
摘要 In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption.This signature provides a policy-and-endorsement mechanism.In this mechanism a single user,whose attributes satisfy the predicate,endorses the message.This signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the signer.The security of this signature,selfless anonymity and existential unforgeability,is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups. In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption.This signature provides a policy-and-endorsement mechanism.In this mechanism a single user,whose attributes satisfy the predicate,endorses the message.This signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the signer.The security of this signature,selfless anonymity and existential unforgeability,is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第6期1293-1304,共12页 计算机科学技术学报(英文版)
基金 supported by the National Nature Science Foundation of China under Grant No.10990011 the National Science Foundation of US under Grant No.CCF-0725340 the National Development and Reform Commission under the project of "A Monitoring Platform for Web Safe Browsing" China Next Generation Internet CNGI Project under Grant No.CNGI-09-01-12
关键词 cryptography fine-grained access control attribute-based signature policy-and-endorsement selfless anonymity existential unforgeability cryptography,fine-grained access control,attribute-based signature,policy-and-endorsement,selfless anonymity,existential unforgeability
  • 相关文献

参考文献18

  • 1Boneh D, Hamburg M. Generalized identity based and broadcast encryption schemes. In Proc. the 14th Int. Conf. the Theory and Application of Cryptology and Information Security, Melbourne, Australia, Dec. 7-11, 2008, pp.455-470.
  • 2Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In Proc. the IEEE Symposium on Security and Privacy, Oakland, USA, May 20-23, 2007, pp.321- 334.
  • 3Boneh D, Boyen X, Shacham H. Short group signatures. In Proc. the 24th Annual International Cryptology Conference, Santa Barbara, USA, Aug. 15-19, 2004, pp.41-55.
  • 4Wei P, Wang X, Zheng Y. Public key encryption without random oracle made truly practical. In Proc. the 11th Int. Conf. Information and Communications Security ( ICICS), Beijing, China, Dec. 14-17, 2009, pp.107-120.
  • 5Sahai A, Waters B. Fuzzy identity-based encryption. In Proc. the 24th Annual Int. Conf. the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, pp.457-473.
  • 6Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In Proc. the 13th ACM Conf. Computer and Communications Security, Virginia, USA, Oct. 30-Nov. 3, 2006, pp.89-98.
  • 7Shahandashti S-F, Safavi-Naini R. Threshold attribute-based signatures and their application to anonymous credential systems. In Proc. the 2nd Int. Conf. Cryptology in Africa, Gammarth, Tunisia, Jun. 21-25, 2009, pp.198-216.
  • 8Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. In Proc. the 35th International Colloquium, Reykjavik, Iceland, Jul. 7-11, 2008, pp.579-591.
  • 9Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Technical Report, Cryptology ePrint archive: Report 2008/290, 2008, http://eprint.iacr.org/2008/290.
  • 10Khader D. Attribute based group signatures. Technical Report, Cryptology ePrint Archive, Report 2007/159, 2007, http://eprint.iacr.org/2007/159.

同被引文献19

  • 1Guo S, Zeng Y. Attribute-based Signature Scheme[C]. In : Proceedings of the 2008 International Conference on Information Security and Assurance.Washington, DC, USA: IEEE Computer Society, 2008. 509-51 1.
  • 2Maji H, Prabhakaran M, Rosulek M. Attribute-Based Signatures[C]. In: Kiayias A. Topics in Cryptology- CT-RSA 2011.Berlin Heidelberg: Springer-Verlag, 2011. 376-392.
  • 3Li J, Kim K. Hidden attribute-based signatures without anonymity revocation[J]. International Journal of Information Sciences, 2010, 180 ( 9): 1681-1689.
  • 4Escala A , Herranz J , Morillo P. Revocable attribute-based signatures with adaptive security in the standard model[C]. In: Nitaj A, Pointcheval D. Proceedings of the 4th international conference on Progress in cryptology in Africa ( AFRICACRYPT' 11 ) . Berlin Heidelberg: Springer-Verlag, 2011. 224-241.
  • 5Shahandashti S , Safavi-Naini R. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems[C]. In: Preneel B. Progress in Cryptology-AFRICACRYPT 2009. Berlin Heidelberg: Springer-Verlag, 2009. 198-216.
  • 6Okamoto T, Takashima K. Efficient Anribute-Based Signatures for Non-monotone Predicates in the Standard Model[C]. In- Catalano D, Fazio N, Gennaro R, et al. Public Key Cryptography-PKC 2011. Berlin Heidelberg: Springer, 2011.35-52.
  • 7Beimel A. Secure schemes for secret sharing and key distribution[D]. PhD thesis , Israel Institute of Technology, 1996.
  • 8Karchmer M, Wigderson A. On Span Programs[C]. In: 8th Annual Structure in Complexity Theory. Berlin Heidelberg: Springer-Verlag, 1993. 102-111.
  • 9Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. In: CCS '06: Proceedings of the 13th ACM conference on Computer and communications security. Alexandria, Virginia, USA: ACM, 2006.89-98.
  • 10Sahai A , Waters B. Fuzzy Identity-Based Encryption[C]. In: Cramer R. Advances in Cryptology EUROCRYPT'05. Berlin Heidelberg: Springer-Verlag, 2005. 457-473.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部