Skip to main content

Securely Outsourcing Decentralized Multi-authority Attribute Based Signature

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10581))

Included in the following conference series:

Abstract

Attribute based signature (ABS) is a novel primitive of digital signature that allows the signer to endorse a piece of message with a set of certain attributes in order to preserve the privacy of the signer’s identity. There are multiple authorities that issue different secret keys for signer’s various attributes. And a central authority is usually established to manage all these attribute authorities. This brings a huge workload to compute a signature and also a threat to security and privacy if the central authority is compromised. In this paper, we present an outsourced decentralized multi-authority attribute based signature (ODMA-ABS) scheme. Compared with existing multi-authority attribute based signature schemes, the ODMA-ABS scheme achieves a stronger notion of attribute privacy and authority collusion resistance. And the workload to compute a signature is further reduced by utilizing the outsourcing technique, which makes our scheme more practical in reality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  2. Maji, H., Prabhakaran, M., Rosulek, M.: Attribute based signatures: achieving attribute privacy and collusion-resistance (2008). http://eprint.iacr.org/2008/328

  3. Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 356–374. Springer, Heidelberg (2008). doi:10.1007/978-3-540-78524-8_20

    Chapter  Google Scholar 

  4. Li, J., Kim, K.: Attribute-based ring signatures (2008). http://eprint.iacr.org/2008/394

  5. Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 198–216. Springer, Heidelberg (2009). doi:10.1007/978-3-642-02384-2_13

    Chapter  Google Scholar 

  6. Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based signature and its applications. In: ACM Symposium on Information, Computer and Communications Security. ACM, pp. 60–69 (2010)

    Google Scholar 

  7. Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376–392. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19074-2_24

    Chapter  Google Scholar 

  8. Cao, D., Zhao, B., Wang, X., Su, J., Ji, G.: Multi-authority attribute-based signature. In: Third International Conference on Intelligent Networking and Collaborative Systems. IEEE Computer Society, pp. 668–672 (2011)

    Google Scholar 

  9. Chen, Y., Chen, J., Yang, G.: Provable secure multi-authority attribute based signatures. J. Converg. Inf. Technol. 8(2), 545–553 (2013)

    MathSciNet  Google Scholar 

  10. Okamoto, T., Takashima, K.: Decentralized attribute-based signatures. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 125–142. Springer, Heidelberg (2013). doi:10.1007/978-3-642-36362-7_9

    Chapter  Google Scholar 

  11. Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264–282. Springer, Heidelberg (2005). doi:10.1007/978-3-540-30576-7_15

    Chapter  Google Scholar 

  12. Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_25

    Chapter  Google Scholar 

  13. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, pp. 169–178 (2009)

    Google Scholar 

  14. Yao, A.C.: Protocols for secure computations. FOCS 82, 160–164 (1982)

    MathSciNet  Google Scholar 

  15. Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97–105 (2010)

    Article  MATH  Google Scholar 

  16. Fiore, D., Gennaro, R., Pastro, V.: Efficiently verifiable computation on encrypted data. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 844–855. ACM (2014)

    Google Scholar 

  17. Lai, J., Deng, R.H., Pang, H., Weng, J.: Verifiable computation on outsourced encrypted data. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 273–291. Springer, Cham (2014). doi:10.1007/978-3-319-11203-9_16

    Google Scholar 

  18. Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Conference on Security, p. 34. USENIX Association (2011)

    Google Scholar 

  19. Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. Cryptology ePrint Archive, Report 2011/185 (2011)

    Google Scholar 

  20. Chen, X., Li, J., Huang, X., Li, J., Xiang, Y., Wong, D.S.: Secure outsourced attribute-based signatures. IEEE Trans. Parallel Distrib. Syst. 25(12), 3285–3294 (2014)

    Article  Google Scholar 

  21. Ren, Y., Jiang, T.: Verifiable outsourced attribute-based signature scheme. Multimedia Tools Appl. 1–11 (2017). doi:10.1007/s11042-017-4539-7

  22. Goldreich, O., Goldwasser, S., Micali, S.: How to construct Randolli functions. In: 25th Annual Symposium on Foundations of Computer Science, pp. 464–479. IEEE (1984)

    Google Scholar 

  23. Boneh, D., Mironov, I., Shoup, V.: A secure signature scheme from bilinear maps. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 98–110. Springer, Heidelberg (2003). doi:10.1007/3-540-36563-X_7

    Chapter  Google Scholar 

  24. Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111–131. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22792-9_7

    Chapter  Google Scholar 

  25. Chow, S.M.: New privacy-preserving architectures for identity-/attribute-based encryption. Doctoral dissertation, Courant Institute of Mathematical Sciences New York (2010)

    Google Scholar 

  26. Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108–125. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03356-8_7

    Chapter  Google Scholar 

Download references

Acknowledgment

This work is supported by the National Nature Science Foundation of China under Grant No.: 61272091, 61772311.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Qin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Sun, J., Qin, J., Ma, J. (2017). Securely Outsourcing Decentralized Multi-authority Attribute Based Signature. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69471-9_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69470-2

  • Online ISBN: 978-3-319-69471-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics