An Attribute-Based Anonymous Authentication Scheme

Proxy signature is a cryptographic primitive used for delegating the signing rights. It helps the proxy signer to sign messages on behalf of the original signer. This signature is used when the original signer is not available to sign a specific document. While several attribute-based signature schemes were proposed, unfortunately they do not have the nature of the agency. In this paper we first formally define a notion of the attribute-based proxy signature scheme. Then we propose an attribute-based proxy signature scheme. Finally we demonstrate that our scheme is efficiently and unforgeable under adaptive chosen-message attack under the Strong EDH assumption.

[1]  Germán Sáez,et al.  Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures , 2003, Financial Cryptography.

[2]  Dengguo Feng,et al.  ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.

[3]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[4]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[5]  Hyunsoo Yoon,et al.  A New Proxy Signature Scheme Providing Self-delegation , 2006, ICISC.

[6]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[7]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[8]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[9]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[10]  Amit K. Awasthi,et al.  ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings , 2007 .

[11]  Chin-Chen Chang,et al.  A novel efficient (t, n) threshold proxy signature scheme , 2006, Inf. Sci..

[12]  Zhenfu Cao,et al.  Identity based proxy multi-signature , 2007, J. Syst. Softw..

[13]  Robert H. Deng,et al.  Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem" , 2004, IEEE Trans. Knowl. Data Eng..

[14]  Jin Li,et al.  Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..

[15]  Reihaneh Safavi-Naini,et al.  An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.

[16]  Yuan Zhou,et al.  Proxy blind multi-signature scheme without a secure channel , 2005, Appl. Math. Comput..

[17]  Dongqing Xie,et al.  Attribute-based signature and its applications , 2010, ASIACCS '10.

[18]  Guo Shaniqng,et al.  Attribute-based Signature Scheme , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[19]  Joonsang Baek,et al.  Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature , 2001 .