Browse > Article
http://dx.doi.org/10.3837/tiis.2015.04.014

Attribute Set Based Signature Secure in the Standard Model  

Li, Baohong (School of Electronics and Information Engineering, Xi'an Jiaotong University)
Zhao, Yinliang (School of Electronics and Information Engineering, Xi'an Jiaotong University)
Zhao, Hongping (518th Hosp. of PLA)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.4, 2015 , pp. 1516-1528 More about this Journal
Abstract
We introduce attribute set based signature (ASBS), a new cryptographic primitive which organizes user attributes into a recursive set based structure such that dynamic constraints can be imposed on how those attributes may be combined to satisfy a signing policy. Compared with attribute based signature (ABS), ASBS is more flexible and efficient in managing user attributes and specifying signing policies. We present a practical construction of ASBS and prove its security in the standard model under three subgroup decision related assumptions. Its efficiency is comparable to that of the most efficient ABS scheme.
Keywords
Attribute set based signatures; signing policy; subgroup decision assumptions; dual system encryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Okamoto and K. Takashima, “Decentralized attribute-based signatures,” in Proc. of Public-Key Cryptography, pp. 125-142, 2013. Article (CrossRef Link)
2 J. Herranz, F. Laguillaumie, B. Libert and C. Ràfols, “Short attribute-based signature for threshold predicates,” in Proc. of Int. Conf. of the cryptographers’ Track at the RSA, pp. 51-67, 2012. Article (CrossRef Link)
3 C. Chen, J. Chen, H. W. Lim et al, “Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures,” in Proc. of Int. Conf. of the cryptographers’ Track at the RSA, pp. 50-67, 2013. Article (CrossRef Link)
4 A. Escala, J. Herranz and P.Morillo, “Revocable attribute-based signatures with adaptive security in the standard model,” in Proc. of Progress in Cryptology - AFRICACRYPT 2011, pp. 224-241, 2011. Article (CrossRef Link)
5 J. Li, M. H. Au, W. Susilo et al, “Attribute-based signature and its application,” in Proc. of 5th ACM Symposium on Information, Computer and Communications Security, pp. 60–69, 2010. Article (CrossRef Link)
6 S. F. Shahandashti and R. Safavi-Naini, “Threshold attribute-based signatures and their application to anonymous credential systems,” in Proc. of Progress in Cryptology – AFRICACRYPT 2009, pp. 198-216, 2009. Article (CrossRef Link)
7 S. Guo and Y. Zeng, “Attribute-based signature scheme,” in Proc. of International Conference on Information Security and Assurancec, pp. 509-511, 2008. Article (CrossRef Link)
8 H. K. Maji, M. Prabhakaran and M. Rosulek, “Attribute-based signatures,” in Proc. of Cryptographers’Track at the RSA Conference, pp. 376-392, 2011. Article (CrossRef Link)
9 A. Beimel, “Secure schemes for secret sharing and key distribution,” PhD thesis, Isral institute of technology, 1996.
10 M. Karchmer and A. W. Karchmer, “On span programs,” in Proc. of the 8th IEEE Structure in Complexity Theory Conference, pp. 102-111, 1993. Article (CrossRef Link)
11 B. Waters, “Efficient identity-based encryption without random oracle,” in Proc. of Advances in Cryptology - EUROCRYPT 2005, pp. 114-127, 2005. Article (CrossRef Link)
12 A. Lewko, “Tools for simulating features of composite order bilinear groups in the prime order setting,” in Proc. of Advances in Cryptology - EUROCRYPT 2012, pp. 318-335, 2012. Article (CrossRef Link)
13 T. Okamoto and K. Takashima, “Efficient attribute-based signatures for non-monotone predicates in the standard model,” in Proc. of the 14th Int. Conf. on Public Key Cryptography, pp. 35-52, 2011. Article (CrossRef Link)
14 A. Lewko and B. Waters, “New techniques for dual system encryption and fully secure HIBE with short ciphertexts,” in Proc. of 7th Theory of Cryptography Conference, pp. 455-479, 2010. Article (CrossRef Link)
15 H. K. Maji, M. Prabhakaran and M. Rosulek, “Attribute-based signatures: achieving attribute-privacy and collusion-resistance,” IACR Cryptology ePrint Archive, pp. 328, 2008. Article (CrossRef Link)
16 R. Bobba, H. Khurana and M. Prabhakaran, “Attribute-sets: a practically motivated enhancement to attribute-based encryption,” in Proc. of 14th European Symposium on Research in Computer Security, pp. 587-604, 2009. Article (CrossRef Link)
17 A. Lewko, T. Okamoto, A. Sahai et al, “Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption,” in Proc. of Advances in Cryptology - EUROCRYPT 2010, pp. 62-91, 2010. Article (CrossRef Link)