Abstract
In this paper a new signature scheme, called Policy-Endorsing Attribute-Based Signature, is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption. This signature provides a policy-and-endorsement mechanism. In this mechanism a single user, whose attributes satisfy the predicate, endorses the message. This signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the signer. The security of this signature, selfless anonymity and existential unforgeability, is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups.
Similar content being viewed by others
References
Boneh D, Hamburg M. Generalized identity based and broadcast encryption schemes. In Proc. the 14th Int. Conf. the Theory and Application of Cryptology and Information Security, Melbourne, Australia, Dec. 7-11, 2008, pp.455–470.
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In Proc. the IEEE Symposium on Security and Privacy, Oakland, USA, May 20-23, 2007, pp.321–334.
Boneh D, Boyen X, Shacham H. Short group signatures. In Proc. the 24th Annual International Cryptology Conference, Santa Barbara, USA, Aug. 15-19, 2004, pp.41–55.
Wei P, Wang X, Zheng Y. Public key encryption without randomoracle made truly practical. In Proc. the 11th Int. Conf. Information and Communications Security (ICICS), Beijing, China, Dec. 14-17, 2009, pp.107–120.
Sahai A, Waters B. Fuzzy identity-based encryption. In Proc. the 24th Annual Int. Conf. the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, pp.457–473.
Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In Proc. the 13th ACM Conf. Computer and Communications Security, Virginia, USA, Oct. 30-Nov. 3, 2006, pp.89–98.
Shahandashti S-F, Safavi-Naini R. Threshold attribute-based signatures and their application to anonymous credential systems. In Proc. the 2nd Int. Conf. Cryptology in Africa, Gammarth, Tunisia, Jun. 21-25, 2009, pp.198–216.
Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. In Proc. the 35th International Colloquium, Reykjavik, Iceland, Jul. 7-11, 2008, pp.579–591.
Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Technical Report, Cryptology ePrint archive: Report 2008/290, 2008, http://eprint.iacr.org/2008/290.
Khader D. Attribute based group signatures. Technical Report, Cryptology ePrint Archive, Report 2007/159, 2007, http://eprint.iacr.org/2007/159.
Yuan E, Tong J. Attributed based access control (abac) for Web services. In Proc. the 2005 IEEE Int. Conf. Web Services, Orlando, USA, July 11-15, 2005, pp.561–569.
Adelsbach A, Huber U, Sadeghi A-R. Property-based broadcast encryption for multi-level security policies. In Proc. the 8th International Conference on Information Security and Cryptology (ICISC), Seoul, Korea, Dec. 1-2, 2005, pp.15–31.
Adelsbach A, Greveler U. A broadcast encryption scheme with free-riders but unconditional security. In Proc. the First International Conference on Digital Rights Management: Technologies, Issues, Challenges and Systems (DRMTICS), Sydney, Australia, Oct. 31-Nov. 2, 2005, pp.246–257.
Kapadia A, Tsang P P, Smith S W. Attribute-based publishing with hidden credentials and hidden policies. In Proc. the 2007 Network and Distributed System Security Symposium, California, USA, Feb. 28-Mar. 2, 2007, The Internet Society.
Huang D, Verma M. Aspe: Attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks, 2009, 7(8): 1526–1535.
Barreto P S L M, Galbraith S D, O’Eigeartaigh C, Scott M Efficient pairing computation on supersingular abelian varieties. Des. Codes Cryptography, 2007, 42(3): 239–271.
Beuchat J-L, Brisebarre N, Detrey J, Okamoto E. Arithmetic operators for pairing-based cryptography. In Proc. the 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Vienna, Austria, Sept. 10-13, 2007, pp.239–255.
Hu H, Hu L, Feng D. On a class of pseudo-random sequences from elliptic curves over finite fields. IEEE Transactions on Information Theory, 2007, 53(7): 2598–2605.
Author information
Authors and Affiliations
Corresponding author
Additional information
This paper is supported by the National Nature Science Foundation of China under Grant No. 10990011, the National Science Foundation of US under Grant No. CCF-0725340, the National Development and Reform Commission under the project of “A Monitoring Platform for Web Safe Browsing”, and China Next Generation Internet CNGI Project under Grant No. CNGI-09-01-12.
Rights and permissions
About this article
Cite this article
Wang, HX., Zhu, Y., Feng, RQ. et al. Attribute-Based Signature with Policy-and-Endorsement Mechanism. J. Comput. Sci. Technol. 25, 1293–1304 (2010). https://doi.org/10.1007/s11390-010-9406-1
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11390-010-9406-1