Anonymous authentication for circuits from correlation-relaxed two-to-one recoding
详细信息    查看全文
  • 作者:Zhengjun Jing ; Guoping Jiang ; Chunsheng Gu…
  • 关键词:Anonymous authentication ; Attribute ; based signatures ; Privacy ; Two ; to one encoding ; Multilinear maps ; General circuits ; Cryptography
  • 刊名:Journal of Ambient Intelligence and Humanized Computing
  • 出版年:2016
  • 出版时间:April 2016
  • 年:2016
  • 卷:7
  • 期:2
  • 页码:153-161
  • 全文大小:528 KB
  • 参考文献:Chunsheng G (2015) Multilinear maps using ideal lattices without encodings of zero. Report, Cryptology ePrint Archive, Report 2015/269, 2015. http://​eprint.​iacr.​org
    Ding S, Zhao Y, Liu Y (2014) Efficient traceable attribute-based signature. In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on, IEEE, pp 582–589
    Escala A, Herranz J, Morillo P (2011) Revocable attribute-based signatures with adaptive security in the standard model. In: Progress in Cryptology—AFRICACRYPT 2011, Springer, Berlin, Lecture Notes in Computer Science, vol 6737, pp 224–241. doi:10.​1007/​978-3-642-21969-6_​14
    Garg S, Gentry C, Halevi S (2013a) Candidate multilinear maps from ideal lattices. In: Advances in Cryptology—EUROCRYPT 2013, Springer, Berlin, Lecture Notes in Computer Science, vol 7881, pp 1–17. doi:10.​1007/​978-3-642-38348-9_​1
    Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013b) Attribute-based encryption for circuits from multilinear maps. In: Advances in Cryptology—CRYPTO 2013, Springer, Berlin, Lecture Notes in Computer Science, vol 8043, pp 479–499. doi:10.​1007/​978-3-642-40084-1_​27
    Garg S, Gentry C, Halevi S, Zhandry M (2014) Fully secure attribute based encryption from multilinear maps. Report, Cryptology ePrint Archive, Report 2014/622, 2014. http://​eprint.​iacr.​org
    Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security. ACM, Alexandria, Virginia, USA, pp 89–98. doi:10.​1145/​1180405.​1180418
    Goyal V, Pandey O, Sahai A, Waters B (2013) Attribute-based encryption for circuits. In: Proceedings of the forty-fifth annual ACM symposium on Theory of computing. ACM, Palo Alto, USA, pp 545–554. doi:10.​1145/​2488608.​2488677
    Herranz J, Laguillaumie F, Libert B, Ràfols C (2012) Short attribute-based signatures for threshold predicates. In: Topics in cryptology—CT-RSA 2012, Springer, Berlin, Lecture Notes in Computer Science, vol 7178, pp 51–67. doi:10.​1007/​978-3-642-27954-6_​4
    Hu Y, Jia H (2015) Cryptanalysis of ggh map. Report, Cryptology ePrint Archive, Report 2015/301 2015. http://​eprint.​iacr.​org
    Jin L, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inform Sci 180(9):1681–1689. doi:10.​1016/​j.​ins.​2010.​01.​008 MathSciNet CrossRef MATH
    Jin L, Au MH, Susilo W, Xie D, Ren K (2010) Attribute-based signature and its applications. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ACM, pp 60–69. doi:10.​1145/​1755688.​1755697
    Jin L, Wang Q, Wang C, Ren K (2011) Enhancing attribute-based encryption with attribute hierarchy. Mob Netw Appl 16(5):553–561. doi:10.​1007/​s11036-010-0233-y CrossRef
    Jin L, Xinyi H, Jingwei L, Xiaofeng C, Yang X (2014) Securely outsourcing attribute-based encryption with checkability. Parallel Distrib Syst IEEE Trans 25(8):2201–2210. doi:10.​1109/​TPDS.​2013.​271 CrossRef
    Kaafarani A, Ghadafi E, Khader D (2014) Decentralized traceable attribute-based signatures. In: Topics in Cryptology—CT-RSA 2014, Springer, Berlin, Lecture Notes in Computer Science, vol 8366, pp 327–348. doi:10.​1007/​978-3-319-04852-9_​17
    Kiyomoto S, Fukushima K, Miyake Y (2014) Security issues on it systems during disasters: a survey. J Ambient Intell Humaniz Comput 5(2):173–185. doi:10.​1007/​s12652-013-0177-8 CrossRef
    Maji H, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Topics in Cryptology—CT-RSA 2011, Springer, Berlin, Lecture Notes in Computer Science, vol 6558, pp 376–392. doi:10.​1007/​978-3-642-19074-2_​24
    Maji HK, Prabhakaran M, Rosulek M (2008) Attribute-based signatures: Achieving attribute-privacy and collusion-resistance. IACR Cryptology ePrint Archive 2008:328
    Mao X, Chen K, Long Y, Wang L (2014) Attribute-based signature on lattices. J Shanghai Jiaotong Univ 19:406–411. doi:10.​1007/​s12204-014-1516-4 CrossRef
    Ogiela MR, Urszula O (2012) Linguistic protocols for secure information management and sharing. Comput Math Appl 63(2):564–572. doi:10.​1016/​j.​camwa.​2011.​10.​038 CrossRef
    Okamoto T, Takashima K (2011) Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Public Key Cryptography—PKC 2011, Springer, Berlin, Lecture Notes in Computer Science, vol 6571, pp 35–52. doi:10.​1007/​978-3-642-19379-8_​3
    Okamoto T, Takashima K (2013) Decentralized attribute-based signatures. In: Public-Key Cryptography—PKC 2013, Springer, Berlin Heidelberg, Lecture Notes in Computer Science, vol 7778, pp 125–142. doi:10.​1007/​978-3-642-36362-7_​9
    Pandey O, Ramchen K, Waters B (2014) Relaxed two-to-one recoding schemes. Security and Cryptography for Networks, Springer International Publishing, Lecture Notes in Computer Science, pp 8642:57–76. doi:10.​1007/​978-3-319-10879-7_​4
    Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology-EUROCRYPT 2005, Springer, Berlin, Lecture Notes in Computer Science, vol 3494, pp 457–473, doi:10.​1007/​11426639_​27
    Shahandashti S, Safavi-Naini R (2009) Threshold attribute-based signatures and their application to anonymous credential systems. In: Progress in Cryptology—AFRICACRYPT 2009, Springer, Berlin Heidelberg, Lecture Notes in Computer Science, vol 5580, pp 198–216. doi:10.​1007/​978-3-642-02384-2_​13
    Takabi H, James J, Ahn J (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6):24–31. doi:10.​1109/​msp.​2010.​186 CrossRef
    Tang F, Li H, Liang B (2014) Attribute-based signatures for circuits from multilinear maps. Information Security, Springer International Publishing, Lecture Notes in Computer Science, pp 8783:54–71. doi:10.​1007/​978-3-319-13257-0_​4
    Wagner D (2014) Key management. Report, http://​www-inst.​cs.​berkeley.​edu/​cs161/​sp14/​notes/​3.​21.​pki
    Wang Q, Chen S (2015) Attribute-based signature for threshold predicates from lattices. Secur Commun Netw 8(5):811–821. doi:10.​1002/​sec.​1038 CrossRef
  • 作者单位:Zhengjun Jing (1) (2)
    Guoping Jiang (2)
    Chunsheng Gu (1)
    Zhimin Yu (1)
    Lingling Xu (3)

    1. College of Computer Engineering, Jiangsu University of Technology, Changzhou, 213001, China
    2. College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China
    3. Department of Information Security Engineering, South China University of Technology, Guangzhou, China
  • 刊物类别:Engineering
  • 刊物主题:Computational Intelligence
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1868-5145
文摘
Anonymous authentication is very useful to protect the users’ identity privacy in distributed environment, such as in cloud computing. With the anonymous property, attribute-based signature (ABS) provides a cryptographic tool to construct a secure authentication scheme. In an attribute-based signature scheme, a signer owning a set of attributes is able to sign anonymously message with regarding to a policy, while the signatures are kept unforgeable even in the case of collusion. In this paper, we provide a novel construction of key-policy ABS for general circuits. Our construction is based on the correlation-relaxed two-to-one recoding (CR-TOR), which can be instantiated from the existence of multilinear maps. Due to the key indistinguishability property of the CR-TOR system, we prove that our scheme is selective unforgeability in the standard model under the k-Multilinear Computational Diffie-Hellman (k-MCDH) assumption. At the same time, the proposed scheme also holds the property of perfect privacy. Our framework based on CR-TOR leads to a circuit-ABS scheme that is conceptually different from the existing construction in the multilinear maps setting.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700