Abstract
Attribute based signature (ABS) is a novel primitive of digital signature that allows the signer to endorse a piece of message with a set of certain attributes in order to preserve the privacy of the signer’s identity. There are multiple authorities that issue different secret keys for signer’s various attributes. And a central authority is usually established to manage all these attribute authorities. This brings a huge workload to compute a signature and also a threat to security and privacy if the central authority is compromised. In this paper, we present an outsourced decentralized multi-authority attribute based signature (ODMA-ABS) scheme. Compared with existing multi-authority attribute based signature schemes, the ODMA-ABS scheme achieves a stronger notion of attribute privacy and authority collusion resistance. And the workload to compute a signature is further reduced by utilizing the outsourcing technique, which makes our scheme more practical in reality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7_5
Maji, H., Prabhakaran, M., Rosulek, M.: Attribute based signatures: achieving attribute privacy and collusion-resistance (2008). http://eprint.iacr.org/2008/328
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 356–374. Springer, Heidelberg (2008). doi:10.1007/978-3-540-78524-8_20
Li, J., Kim, K.: Attribute-based ring signatures (2008). http://eprint.iacr.org/2008/394
Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 198–216. Springer, Heidelberg (2009). doi:10.1007/978-3-642-02384-2_13
Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based signature and its applications. In: ACM Symposium on Information, Computer and Communications Security. ACM, pp. 60–69 (2010)
Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376–392. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19074-2_24
Cao, D., Zhao, B., Wang, X., Su, J., Ji, G.: Multi-authority attribute-based signature. In: Third International Conference on Intelligent Networking and Collaborative Systems. IEEE Computer Society, pp. 668–672 (2011)
Chen, Y., Chen, J., Yang, G.: Provable secure multi-authority attribute based signatures. J. Converg. Inf. Technol. 8(2), 545–553 (2013)
Okamoto, T., Takashima, K.: Decentralized attribute-based signatures. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 125–142. Springer, Heidelberg (2013). doi:10.1007/978-3-642-36362-7_9
Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264–282. Springer, Heidelberg (2005). doi:10.1007/978-3-540-30576-7_15
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_25
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, pp. 169–178 (2009)
Yao, A.C.: Protocols for secure computations. FOCS 82, 160–164 (1982)
Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97–105 (2010)
Fiore, D., Gennaro, R., Pastro, V.: Efficiently verifiable computation on encrypted data. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 844–855. ACM (2014)
Lai, J., Deng, R.H., Pang, H., Weng, J.: Verifiable computation on outsourced encrypted data. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 273–291. Springer, Cham (2014). doi:10.1007/978-3-319-11203-9_16
Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Conference on Security, p. 34. USENIX Association (2011)
Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. Cryptology ePrint Archive, Report 2011/185 (2011)
Chen, X., Li, J., Huang, X., Li, J., Xiang, Y., Wong, D.S.: Secure outsourced attribute-based signatures. IEEE Trans. Parallel Distrib. Syst. 25(12), 3285–3294 (2014)
Ren, Y., Jiang, T.: Verifiable outsourced attribute-based signature scheme. Multimedia Tools Appl. 1–11 (2017). doi:10.1007/s11042-017-4539-7
Goldreich, O., Goldwasser, S., Micali, S.: How to construct Randolli functions. In: 25th Annual Symposium on Foundations of Computer Science, pp. 464–479. IEEE (1984)
Boneh, D., Mironov, I., Shoup, V.: A secure signature scheme from bilinear maps. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 98–110. Springer, Heidelberg (2003). doi:10.1007/3-540-36563-X_7
Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111–131. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22792-9_7
Chow, S.M.: New privacy-preserving architectures for identity-/attribute-based encryption. Doctoral dissertation, Courant Institute of Mathematical Sciences New York (2010)
Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108–125. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03356-8_7
Acknowledgment
This work is supported by the National Nature Science Foundation of China under Grant No.: 61272091, 61772311.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Sun, J., Qin, J., Ma, J. (2017). Securely Outsourcing Decentralized Multi-authority Attribute Based Signature. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-69471-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69470-2
Online ISBN: 978-3-319-69471-9
eBook Packages: Computer ScienceComputer Science (R0)