Skip to main content

Attribute-Based Signatures with Controllable Linkability

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9565))

Abstract

We introduce Attribute-Based Signatures with Controllable Linkability ABS-CL. In general, Attribute-Based Signatures allow a signer who possesses enough attributes to satisfy a predicate to sign a message without revealing either the attributes utilized for signing or the identity of the signer. These signatures are an alternative to Identity-Based Signatures for more fine-grained policies or enhanced privacy. On the other hand, the Controllable Linkability notion introduced by Hwang et al. [14] allows an entity in possession of the linking key to determine if two signatures were created by the same signer without breaking anonymity. This functionality is useful in applications where a lower level of anonymity to enable linkability is acceptable, such as some cases of vehicular ad-hoc networks, data mining, and voting schemes. The ABS-CL scheme we present allows a signer with enough attributes satisfying a predicate to sign a message, while an entity with the linking key may test if two such signatures were created by the same signer, all without revealing the satisfying attributes or the identity of the signer.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bernhard, D., Fuchsbauer, G., Ghadafi, E., Smart, N.P., Warinschi, B.: Anonymous attestation with user-controlled linkability. Int. J. Inf. Secur. 12(3), 219–249 (2013)

    Article  Google Scholar 

  2. Bohli, J.M., Pashalidis, A.: Relations among privacy notions. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 4 (2011)

    Article  MATH  Google Scholar 

  3. Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004). http://dx.doi.org/10.1007/978-3-540-24676-3_4

    Chapter  Google Scholar 

  4. Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132–145. ACM, New York (2004). http://doi.acm.org/10.1145/1030083.1030103

  5. Changxia, S., Wenping, M.: Secure attribute-based threshold signature without a trusted central authority. Spec. Issue Adv. Comput. Electron. Eng. 7(12), 2899 (2012)

    Google Scholar 

  6. Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991). http://dx.doi.org/10.1007/3-540-46416-6_22

    Chapter  Google Scholar 

  7. El Kaafarani, A., Chen, L., Ghadafi, E., Davenport, J.: Attribute-based signatures with user-controlled linkability. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 256–269. Springer, Heidelberg (2014). http://dx.doi.org/10.1007/978-3-319-12280-9_17

    Google Scholar 

  8. El Kaafarani, A., Ghadafi, E., Khader, D.: Decentralized traceable attribute-based signatures. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 327–348. Springer, Heidelberg (2014). http://dx.doi.org/10.1007/978-3-319-04852-9_17

    Chapter  Google Scholar 

  9. Gagné, M., Narayan, S., Safavi-Naini, R.: Short pairing-efficient threshold-attribute-based signature. In: Abdalla, M., Lange, T. (eds.) Pairing 2012. LNCS, vol. 7708, pp. 295–313. Springer, Heidelberg (2013). http://dx.doi.org/10.1007/978-3-642-36334-4_19

    Chapter  Google Scholar 

  10. Ghadafi, E.: Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 391–409. Springer, Heidelberg (2015). http://dx.doi.org/10.1007/978-3-319-16715-2_21

    Google Scholar 

  11. Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415–432. Springer, Heidelberg (2008). http://dx.doi.org/10.1007/978-3-540-78967-3_24

    Chapter  Google Scholar 

  12. Herranz, J., Laguillaumie, F., Libert, B., Ràfols, C.: Short attribute-based signatures for threshold predicates. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 51–67. Springer, Heidelberg (2012). http://dx.doi.org/10.1007/978-3-642-27954-6_4

    Chapter  Google Scholar 

  13. Hwang, J.Y., Chen, L., Cho, H.S., Nyang, D.: Short dynamic group signature scheme supporting controllable linkability. IEEE Trans. Inf. Forensics Secur. 10(6), 1109–1124 (2015)

    Article  Google Scholar 

  14. Hwang, J.Y., Lee, S., Chung, B.H., Cho, H.S., Nyang, D.: Short group signatures with controllable linkability. In: 2011 Workshop on Lightweight Security Privacy: Devices, Protocols and Applications (LightSec), pp. 44–52, March 2011

    Google Scholar 

  15. Hwang, J.Y., Lee, S., Chung, B.H., Cho, H.S., Nyang, D.: Group signatures with controllable linkability for dynamic membership. Inf. Sci. 222, 761–778 (2013). http://www.sciencedirect.com/science/article/pii/S0020025512005373, including Special Section on New Trends in Ambient Intelligence and Bio-inspired Systems

    Article  MathSciNet  MATH  Google Scholar 

  16. Khader, D.: Attribute-based group signature with revocation (2007)

    Google Scholar 

  17. Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures: achieving attribute-privacy and collusion-resistance (2008)

    Google Scholar 

  18. Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376–392. Springer, Heidelberg (2011). http://dx.doi.org/10.1007/978-3-642-19074-2_24

    Chapter  Google Scholar 

  19. Okamoto, T., Takashima, K.: Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 35–52. Springer, Heidelberg (2011). http://dx.doi.org/10.1007/978-3-642-19379-8_3

    Chapter  Google Scholar 

  20. Okamoto, T., Takashima, K.: Decentralized attribute-based signatures. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 125–142. Springer, Heidelberg (2013). http://dx.doi.org/10.1007/978-3-642-36362-7_9

    Chapter  Google Scholar 

  21. Park, H., Kent, S.: Traceable anonymous certificate (2009)

    Google Scholar 

  22. Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 198–216. Springer, Heidelberg (2009). http://dx.doi.org/10.1007/978-3-642-02384-2_13

    Chapter  Google Scholar 

  23. Tate, S.R., Vishwanathan, R.: Expiration and revocation of keys for attribute-based signatures. In: Samarati, P. (ed.) DBSec 2015. LNCS, vol. 9149, pp. 153–169. Springer, Heidelberg (2015). http://dx.doi.org/10.1007/978-3-319-20810-7_10

    Chapter  Google Scholar 

Download references

Acknowledgements

The second author was partially funded by the Fonds National de la Recherche (FNR), Luxembourg. We would like to thank Ali El Kaafarani, and the anonymous reviewers of INTRUST 2015, for their valuable comments and helpful suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miguel Urquidi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Urquidi, M., Khader, D., Lancrenon, J., Chen, L. (2016). Attribute-Based Signatures with Controllable Linkability. In: Yung, M., Zhang, J., Yang, Z. (eds) Trusted Systems. INTRUST 2015. Lecture Notes in Computer Science(), vol 9565. Springer, Cham. https://doi.org/10.1007/978-3-319-31550-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31550-8_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31549-2

  • Online ISBN: 978-3-319-31550-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics