Abstract
Attribute-Based Group Signature (ABGS) allows a member of a group who possesses precise attributes to sign on behalf of others. Moreover, it allows a verifier to confirm that the signer indeed possesses the attributes claimed, when signing. Naturally, a user’s attributes may hold confidential information, and hence must be protected. According to our observations, there is a scope for improvement in the existing ABGS schemes in efficiently providing anonymity of a user’s attributes. Inspired by the original ABGS scheme by D. Khader, we propose a new ABGS scheme in this paper that uses Oblivious Signature-Based Envelope (OSBE) protocol to provide anonymity of user’s attributes. Our construction is efficient in that the signature or the verification process eliminates exploiting any attributes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)
Park, S., Kim, S., Won, D.: ID-based group signature. Electronics Letters 33(19), 1616–1617 (1997)
Khader, D.: Attribute based group signatures. In: Cryptology ePrint Archive, Report 2007/159 (2007)
Khader, D.: Attribute based group signature with revocation. In: Cryptology ePrintArchive, Report 2007/241 (2007)
Khader, D.: Authenticating with attributes. In: Cryptology ePrint Archive: Report 2008/031 (2008)
Khader, D., Chen, L., Davenport, J.H.: Certificate-Free Attribute Authentication. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol. 5921, pp. 301–325. Springer, Heidelberg (2009)
Li, N., Du, W., Boneh, D.: Oblivious Signature-Based Envelope. Springer, Heidelberg (2004)
Boneh, D., Boyen, X.: Short Signatures Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004)
Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98 (2006)
Advanced Crypto Software Collection, cpabe package, http://acsc.cs.utexas.edu/cpabe
The Pairing Based Cryptography Library, http://crypto.stanford.edu/pbc/
Emura, K., Miyaji, A., Omote, K.: A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics. In: International Conference on Availability, Reliability and Security, ARES 2009 (2009)
Frikken, K., Atallah, M., Li, J.: Attribute-Based Access Control with Hidden Policies and Hidden Credentials. IEEE Transactions on Computers 55(10) (2006)
Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based Signature and its Applications. In: ASIACCS 2010. ACM, Beijing (2010)
Maji, H., Prabhakaran, M., Rosulek, M.: Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance. CNS 07-16626 (2007)
Holt, J.E., Bradshaw, R.W., Seamons, K.E., Orman, H.: Hidden Credentials. In: 2nd ACM Workshop on Privacy in the Electronic Society (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Patel, B.K., Jinwala, D. (2012). Anonymity in Attribute-Based Group Signatures. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds) Advanced Computing, Networking and Security. ADCONS 2011. Lecture Notes in Computer Science, vol 7135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29280-4_58
Download citation
DOI: https://doi.org/10.1007/978-3-642-29280-4_58
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29279-8
Online ISBN: 978-3-642-29280-4
eBook Packages: Computer ScienceComputer Science (R0)