Skip to main content

Anonymity in Attribute-Based Group Signatures

  • Conference paper
Advanced Computing, Networking and Security (ADCONS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7135))

Abstract

Attribute-Based Group Signature (ABGS) allows a member of a group who possesses precise attributes to sign on behalf of others. Moreover, it allows a verifier to confirm that the signer indeed possesses the attributes claimed, when signing. Naturally, a user’s attributes may hold confidential information, and hence must be protected. According to our observations, there is a scope for improvement in the existing ABGS schemes in efficiently providing anonymity of a user’s attributes. Inspired by the original ABGS scheme by D. Khader, we propose a new ABGS scheme in this paper that uses Oblivious Signature-Based Envelope (OSBE) protocol to provide anonymity of user’s attributes. Our construction is efficient in that the signature or the verification process eliminates exploiting any attributes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)

    Google Scholar 

  2. Park, S., Kim, S., Won, D.: ID-based group signature. Electronics Letters 33(19), 1616–1617 (1997)

    Article  Google Scholar 

  3. Khader, D.: Attribute based group signatures. In: Cryptology ePrint Archive, Report 2007/159 (2007)

    Google Scholar 

  4. Khader, D.: Attribute based group signature with revocation. In: Cryptology ePrintArchive, Report 2007/241 (2007)

    Google Scholar 

  5. Khader, D.: Authenticating with attributes. In: Cryptology ePrint Archive: Report 2008/031 (2008)

    Google Scholar 

  6. Khader, D., Chen, L., Davenport, J.H.: Certificate-Free Attribute Authentication. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol. 5921, pp. 301–325. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Li, N., Du, W., Boneh, D.: Oblivious Signature-Based Envelope. Springer, Heidelberg (2004)

    Google Scholar 

  8. Boneh, D., Boyen, X.: Short Signatures Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004)

    Google Scholar 

  10. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98 (2006)

    Google Scholar 

  11. Advanced Crypto Software Collection, cpabe package, http://acsc.cs.utexas.edu/cpabe

  12. The Pairing Based Cryptography Library, http://crypto.stanford.edu/pbc/

  13. Emura, K., Miyaji, A., Omote, K.: A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics. In: International Conference on Availability, Reliability and Security, ARES 2009 (2009)

    Google Scholar 

  14. Frikken, K., Atallah, M., Li, J.: Attribute-Based Access Control with Hidden Policies and Hidden Credentials. IEEE Transactions on Computers 55(10) (2006)

    Google Scholar 

  15. Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based Signature and its Applications. In: ASIACCS 2010. ACM, Beijing (2010)

    Google Scholar 

  16. Maji, H., Prabhakaran, M., Rosulek, M.: Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance. CNS 07-16626 (2007)

    Google Scholar 

  17. Holt, J.E., Bradshaw, R.W., Seamons, K.E., Orman, H.: Hidden Credentials. In: 2nd ACM Workshop on Privacy in the Electronic Society (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Patel, B.K., Jinwala, D. (2012). Anonymity in Attribute-Based Group Signatures. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds) Advanced Computing, Networking and Security. ADCONS 2011. Lecture Notes in Computer Science, vol 7135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29280-4_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29280-4_58

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29279-8

  • Online ISBN: 978-3-642-29280-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics