Anonymous authentication for circuits from correlation-relaxed two-to-one recoding

Anonymous authentication is very useful to protect the users’ identity privacy in distributed environment, such as in cloud computing. With the anonymous property, attribute-based signature (ABS) provides a cryptographic tool to construct a secure authentication scheme. In an attribute-based signature scheme, a signer owning a set of attributes is able to sign anonymously message with regarding to a policy, while the signatures are kept unforgeable even in the case of collusion. In this paper, we provide a novel construction of key-policy ABS for general circuits. Our construction is based on the correlation-relaxed two-to-one recoding (CR-TOR), which can be instantiated from the existence of multilinear maps. Due to the key indistinguishability property of the CR-TOR system, we prove that our scheme is selective unforgeability in the standard model under the k-Multilinear Computational Diffie-Hellman (k-MCDH) assumption. At the same time, the proposed scheme also holds the property of perfect privacy. Our framework based on CR-TOR leads to a circuit-ABS scheme that is conceptually different from the existing construction in the multilinear maps setting.

[1]  Manoj Prabhakaran,et al.  Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance , 2008, IACR Cryptol. ePrint Arch..

[2]  Manoj Prabhakaran,et al.  Attribute-Based Signatures , 2011, CT-RSA.

[3]  Brent Waters,et al.  Relaxed Two-to-One Recoding Schemes , 2014, SCN.

[4]  Dongqing Xie,et al.  Attribute-based signature and its applications , 2010, ASIACCS '10.

[5]  Walter Fumy Key Management , 1991, Computer Security and Industrial Cryptography.

[6]  Jin Li,et al.  Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..

[7]  Yiming Zhao,et al.  Efficient Traceable Attribute-Based Signature , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[8]  Tatsuaki Okamoto,et al.  Decentralized Attribute-Based Signatures , 2013, Public Key Cryptography.

[9]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.

[10]  Shaozhen Chen,et al.  Attribute-based signature for threshold predicates from lattices , 2015, Secur. Commun. Networks.

[11]  Yu Long,et al.  Attribute-based signature on lattices , 2014 .

[12]  Tatsuaki Okamoto,et al.  Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model , 2014, IEEE Transactions on Cloud Computing.

[13]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[14]  Craig Gentry,et al.  Fully Secure Functional Encryption without Obfuscation , 2014, IACR Cryptol. ePrint Arch..

[15]  Cong Wang,et al.  Enhancing attribute-based encryption with attribute hierarchy , 2009, ICC 2009.

[16]  Brent Waters,et al.  Attribute-Based Encryption for Circuits from Multilinear Maps , 2012, CRYPTO.

[17]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[18]  Craig Gentry,et al.  Fully Secure Attribute Based Encryption from Multilinear Maps , 2014, IACR Cryptol. ePrint Arch..

[19]  Paz Morillo,et al.  Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model , 2011, AFRICACRYPT.

[20]  Javier Herranz,et al.  Short Attribute-Based Signatures for Threshold Predicates , 2012, CT-RSA.

[21]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[22]  Craig Gentry,et al.  Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.

[23]  Yupu Hu,et al.  Cryptanalysis of GGH Map , 2016, EUROCRYPT.

[24]  Chunsheng Gu Multilinear Maps Using Ideal Lattices without Encodings of Zero , 2015, IACR Cryptol. ePrint Arch..

[25]  Haiying Gao,et al.  Attribute-Based Encryption for Circuits on Lattices , 2014 .

[26]  Reihaneh Safavi-Naini,et al.  Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.

[27]  Marek R. Ogiela,et al.  Linguistic protocols for secure information management and sharing , 2012, Comput. Math. Appl..

[28]  Ali El Kaafarani,et al.  Decentralized Traceable Attribute-Based Signatures , 2014, CT-RSA.

[29]  Shinsaku Kiyomoto,et al.  Security issues on IT systems during disasters: a survey , 2013, Journal of Ambient Intelligence and Humanized Computing.

[30]  Hongda Li,et al.  Attribute-Based Signatures for Circuits from Multilinear Maps , 2014, ISC.