XIANG Xinyin, LI Hui, ZHAO Xingwen. Key Evolving Attribute-Based Signature Under Short Integer Solution Problem[J]. Chinese Journal of Electronics, 2016, 25(5): 901-906. doi: 10.1049/cje.2016.08.042
Citation: XIANG Xinyin, LI Hui, ZHAO Xingwen. Key Evolving Attribute-Based Signature Under Short Integer Solution Problem[J]. Chinese Journal of Electronics, 2016, 25(5): 901-906. doi: 10.1049/cje.2016.08.042

Key Evolving Attribute-Based Signature Under Short Integer Solution Problem

doi: 10.1049/cje.2016.08.042
Funds:  This work is supported by the National Natural Science Foundation of China (No.61272455, No.61272457), the Fundamental Research Funds for the Central Universities (No.K50511010001, No.K5051201003, No.K5051201039), and Research Fund for the Doctoral Program of Higher Education of China (No.20130203120003).
  • Received Date: 2014-12-12
  • Rev Recd Date: 2015-07-21
  • Publish Date: 2016-09-10
  • Key exposure is a severe threat in digital signature, the scheme will be compromised provided that the private key of the signature is revealed. To remove the destruction of key exposure, the private key must be kept updated in the process of the signature. As a new cryptographic primitive, Attribute-based signature (ABS) scheme has the limitation in practical applications because the private key may be leaked. So far, very little works have focused on the key leakage of ABS, especially in the setting of lattices. To deal with the problem, we present the construction of Key evolving attribute-based signature (ke-ABS) under Short integer solution (SIS) problem. As a new research field in the point, our scheme has considered a threshold access structure, which allows users with attributes satisfying the defined policy that can generate a valid signature without revealing more information. Compared with the known schemes, our scheme provides an assurance of unforgeability and attribute signer privacy.
  • loading
  • H. Maji, M. Prabhakaran and M. Rosulek, "Attribute-based signatures:achieving attribute-privacy and collusion-resistance", http://eprint.iacr.org/2008/328.pdf, 2008-8-3.
    C.J. Wang, "A provable secure fuzzy identity based signature scheme", Sci. China Inform. 2012, Vol.55, No.9, pp.2139-2148, 2012.
    P.Y. Yang, Z.F. Cao and X.L. Dong, "Fuzzy identity based signature", http://eprint.iacr.org/2008/002.pdf, 2008-1-3.
    C.J. Wang and J. Kim, "Two constructions of fuzzy identity based signature", BMEI 2009, Tianjin, China, pp.1-5, 2009.
    J.H. Wei, W.F. Liu and X.X. Hu, "Forward secure threshold attribute-based signature scheme", http://comjnl.oxfordjournals.org/content/early, 2014-9-25.
    D. Khader, "Attribute based group signature with revocation", http://eprint.iacr.org/2007/241.pdf, 2007-6-16.
    D. Khader, "Attribute based group signatures", http://eprint.iacr.org/2007/159.pdf, 2007-4-30.
    L. Lin and K. Kim, "Attribute-based ring signatures", http://eprint.iacr.org/2008/394.pdf, 2008-9-16.
    F. Siamak, S. Shahandashti and N. Reihaneh, "Threshold attribute-based signatures and their application to anonymous credential systems", AFRICACRYPT'09, Gammarth, Tunisia, Africa, Berlin, Heidelberg, pp.198-216, 2009.
    J. Li and K. Kwangjo, "Hidden attribute-based signatures without anonymity revocation", Information Sciences, Vol.180, No.9, pp.1681-1689, 2010.
    S. Kumar, S. Agrawal, S. Balaraman, et al., "Attribute based signatures for bounded multi-level threshold circuits", EuroPKI' 10, Athens, Greece, pp.141-154, 2010.
    T. Okamoto and K. Takashima, "Efficient attribute-based signatures for non-monotone predicates in the standard model", PKC'11, Taormina, Italy, pp.35-52, 2011.
    J. Herranz, F. Laguillaumie, B. Libert, et al., "Short attributebased signatures for threshold predicates", CT-RSA 2012. San Francisco, USA, pp.51-67, 2012.
    S. Agrawal, D. Boneh and X. Boyen, "Efficient lattice (H)IBE in the standard model", Advances in Cryptology-EUROCRYPT 2010, Riviera, France, LNCS 6110, Springer Berlin/Heidelberg, pp.553-572, 2010.
    D. Cash, D. Hofheinz, E. Kiltz, et al., "Bonsai trees, or how to delegate a lattice basis", EUROCRYPT 2010, Riviera, France, LNCS 6110, Springer-Verlag:Heidelberg, pp.523-552, 2010.
    C. Gentry, C. Peikert and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions", STOC'2008, Victoria, BC, Canada, pp.197-206, 2008.
    D.Micciancio and O. Regev, "Worst-case to average-case reductions based on gaussian measures", SIAM J. Comput, Vol.37, No.1, pp.267-302, 2007.
    W. Zhu, J. Yu, T. Wang, et al., "Efficient attribute-based encryption from R-LWE", Chinese Journal of Electronics, Vol.23, No.3, pp.778-782, 2014.
  • 加载中


    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (194) PDF downloads(549) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint