An Expressive Attribute-based Signature Scheme without Random Oracles

Attribute-based signatures (ABS) is a new cryptographic primitive and can play a great role in attribute- based access control systems. In ABS, a signer can choose its attributes satisfying a policy of a verifier to generate a valid signature without reveal its identity or attributes, while the signature assures that the message is endorsed by an individual owning attributes the policy requiring. However, most existing works of ABS need random oracles, which is unpractical and results in the dependence of security on hash functions. In this paper, we refer to the mature techniques used in identity-based encryption (IBE) to propose an ABS scheme without random oracles. Our scheme support any expressive policy consisting of AND, OR, threshold gates, which offers great flexibility to the implementation of access control.

[1]  Jinshu Su,et al.  Authenticating with Attributes in Online Social Networks , 2011, 2011 14th International Conference on Network-Based Information Systems.

[2]  Manoj Prabhakaran,et al.  Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance , 2008, IACR Cryptol. ePrint Arch..

[3]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[4]  Guo Shaniqng,et al.  Attribute-based Signature Scheme , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[5]  Avi Wigderson,et al.  On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.

[6]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[7]  Jin Li,et al.  Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..

[8]  Xiaolei Dong,et al.  Fuzzy Identity Based Signature , 2008, IACR Cryptol. ePrint Arch..

[9]  Dalia Khader Authenticating with Attributes , 2008, IACR Cryptol. ePrint Arch..

[10]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[11]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[12]  Reihaneh Safavi-Naini,et al.  Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.

[13]  Dan Boneh,et al.  Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.

[14]  Bok-Min Goi,et al.  On the Security of an Attribute-Based Signature Scheme , 2009 .

[15]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..

[16]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.

[17]  Ran Canetti,et al.  A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.

[18]  Wei Chen,et al.  A Fuzzy Identity Based Signature Scheme , 2009, 2009 International Conference on E-Business and Information System Security.

[19]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[20]  Dongqing Xie,et al.  Attribute-based signature and its applications , 2010, ASIACCS '10.

[21]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.