Abstract
Attribute-based signature (ABS) enables a signer to sign messages over attributes without revealing any information about the master key of the system. Generally, the signer needs to execute modular exponentiation and bilinear pairing for many times in most of ABS systems, which is intolerable for resource-limited devices. In this paper, a secure verifiable outsourced attribute- based signature scheme is proposed, where the computational overload of the signer could be delegated to an untrusted signing-cloud service provider (S-CSP). The proposed scheme can greatly reduce computational cost of the signer and check the correctness of the output returned by S-CSP. The experiment shows that the computational cost for the signer is much smaller than that for directly computing the signature, which is applicable for the resource-limited devices to complete the signing of an ABS system.
Similar content being viewed by others
References
Atallah MJ, Frikken KB (2010) Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM symposium on information, Computer and Communications Security. ACM, pp. 48–59
Benjamin D, Atallah MJ (2008) Private and cheating-free outsourcing of algebraic computations. In: Privacy, Security and Trust, 2008. PST'08. Sixth Annual Conference on. IEEE, p 240–245
Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Annual international cryptology conference. Springer, Berlin Heidelberg, pp 213–229
Chaum D, Pedersen TP (1992) Wallet databases with observers. In: Annual international cryptology conference. Springer, Berlin Heidelberg, pp 89–105
Chen X, Li J, Huang X, Li J, Xiang Y, Wong DS (2014a) Secure outsourced attribute-based signatures. IEEE Trans Parallel Distrib Syst 25(12):3285–3294
Chen X, Li J, Ma J, Tang Q, Lou W (2014b) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Parallel Distrib Syst 25(9):2386–2396
Chevallier-Mames B, Coron JS, McCullagh N, Naccache D, Scott M (2010). Secure delegation of elliptic-curve pairing. In: International Conference on smart card research and advanced applications. Springer, Berlin Heidelberg, p 24–35
Choon JC, Cheon JH (2003) An identity-based signature from gap Diffie-Hellman groups. In: International workshop on public key cryptography. Springer, Berlin Heidelberg, pp 18–30
Escala A, Herranz J, Morillo P (2011) Revocable attribute-based signatures with adaptive security in the standard model. In: International conference on cryptology in Africa. Springer, Berlin Heidelberg, pp 224–241
Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Annual cryptology conference. Springer, Berlin Heidelberg, pp 465–482
Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE Ciphertexts. In USENIX Security Symposium Vol. 2011, No. 3
Guo P, Wang J, Geng XH, Kim CS, Kim JU (2014) A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology 15(6):929–935
Hohenberger S, Lysyanskaya A (2005) How to securely outsource cryptographic computations. In: Theory of cryptography conference. Springer, Berlin Heidelberg, pp 264–282
Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354
Li J, Kim K (2008) Attribute-based ring signatures. IACR Cryptology ePrint Archive 2008:394
Li J, Au MH, Susilo W, Xie D, Ren K (2010) Attribute-based signature and its applications. In: Proceedings of the 5th ACM symposium on information. ACM, Computer and Communications Security, pp 60–69
Liu JK, Baek J, Zhou J, Yang Y, Wong JW (2010) Efficient online/offline identity-based signature for wireless sensor network. Int J Inf Secur 9(4):287–296
Maji HK, Prabhakaran M, Rosulek M (2008) Attribute-based signatures: achieving attribute-privacy and collusion-resistance. IACR Cryptology ePrint Archive, 2008, 328
Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Kiayias A (ed) Cryptographers’ track at the RSA conference. Springer, Berlin Heidelberg, pp 376–392
Matsumoto T, Kato K, Imai H (1988) Speeding up secret computations with insecure auxiliary devices. In: Conference on the theory and application of cryptography. Springer, New York, pp 497–506
Okamoto T, Takashima K (2011) Efficient attribute-based signatures for non-monotone predicates in the standard model. In: International workshop on public key cryptography. Springer, Berlin Heidelberg, pp 35–52
Ren Y, Ding N, Zhang X, Lu H, Gu D (2016a) Verifiable outsourcing algorithms for modular exponentiations with improved checkability. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, pp 293–303
Ren Y, Ding N, Wang T, Lu H, Gu D (2016b) New algorithms for verifiable outsourcing of bilinear pairings. Sci China Inf Sci 59(9):99103
Ren Y, Ding N, Zhang X, Lu H, Gu D (2016c) Identity-based encryption with verifiable outsourced revocation. Comput J 59(11):1659–1668
Shahandashti SF, Safavi-Naini R (2009) Threshold attribute-based signatures and their application to anonymous credential systems. In: International conference on cryptology in Africa. Springer, Berlin Heidelberg, pp 198–216
Takabi H, Joshi JB, Ahn GJ (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6):24–31
Tian H, Zhang F, Ren K. (2015) Secure bilinear pairing outsourcing made more efficient and flexible. In Proceedings of the 10th ACM symposium on information, Computer and Communications Security. ACM, p 417–426
Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the 8th International Conference on Network and Service Management. International Federation for Information Processing, pp. 37–45
Acknowledgements
The work described in this paper was supported by the National Natural Science Foundation of China (Grant No. 61572309, 61525203).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ren, Y., Jiang, T. Verifiable outsourced attribute-based signature scheme. Multimed Tools Appl 77, 18105–18115 (2018). https://doi.org/10.1007/s11042-017-4539-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4539-7