A New Approach to Threshold Attribute Based Signatures

Inspired by developments in attribute based encryption and signatures, there has recently been a spurt of progress in the direction of threshold attribute based signatures (t-ABS). In this work we propose a novel approach to construct threshold attribute based signatures inspired by ring signatures. Threshold attribute based signatures, defined by a (t, n∗) threshold predicate, ensure that the signer holds atleast t out of a specified set of n∗ attributes to pass the verification. Another way to look at this would be that, the signer has atleast 1 out of the ( n∗ t ) combination of attribute sets. Thus, a new approach to t-ABS would be to let the signer pick some n′ sets of t attributes each, from the ( n∗ t ) possible sets, and prove that (s)he has atleast one of the n′ sets in his/her possession. In this work, we provide a flexible threshold-ABS scheme that realizes this approach. We also prove our scheme to be secure with the help of random oracles.

[1]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[2]  Jan Camenisch,et al.  Efficient and Generalized Group Signatures , 1997, EUROCRYPT.

[3]  Jin Li,et al.  Attribute-Based Ring Signatures , 2008, IACR Cryptol. ePrint Arch..

[4]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[5]  Dalia Khader,et al.  Attribute Based Group Signature with Revocation , 2007, IACR Cryptol. ePrint Arch..

[6]  Xavier Boyen,et al.  Mesh Signatures , 2007, EUROCRYPT.

[7]  Dongqing Xie,et al.  Attribute-based signature and its applications , 2010, ASIACCS '10.

[8]  Siu-Ming Yiu,et al.  Efficient Identity Based Ring Signature , 2005, ACNS.

[9]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[10]  Manoj Prabhakaran,et al.  Attribute-Based Signatures , 2011, CT-RSA.

[11]  Reihaneh Safavi-Naini,et al.  Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.

[12]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[13]  Dalia Khader,et al.  Attribute Based Group Signatures , 2007, IACR Cryptol. ePrint Arch..

[14]  C. Pandu Rangan,et al.  Attribute Based Signatures for Bounded Multi-level Threshold Circuits , 2010, EuroPKI.

[15]  Germán Sáez,et al.  New Identity-Based Ring Signature Schemes , 2004, ICICS.

[16]  Chow Sze Ming Forward Security from Bilinear Pairings: Signcryption and Threshold Signature , 2004 .

[17]  Manoj Prabhakaran,et al.  Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance , 2008, IACR Cryptol. ePrint Arch..

[18]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.