Skip to main content
Log in

Verifiable outsourced attribute-based signature scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Attribute-based signature (ABS) enables a signer to sign messages over attributes without revealing any information about the master key of the system. Generally, the signer needs to execute modular exponentiation and bilinear pairing for many times in most of ABS systems, which is intolerable for resource-limited devices. In this paper, a secure verifiable outsourced attribute- based signature scheme is proposed, where the computational overload of the signer could be delegated to an untrusted signing-cloud service provider (S-CSP). The proposed scheme can greatly reduce computational cost of the signer and check the correctness of the output returned by S-CSP. The experiment shows that the computational cost for the signer is much smaller than that for directly computing the signature, which is applicable for the resource-limited devices to complete the signing of an ABS system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Atallah MJ, Frikken KB (2010) Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM symposium on information, Computer and Communications Security. ACM, pp. 48–59

  2. Benjamin D, Atallah MJ (2008) Private and cheating-free outsourcing of algebraic computations. In: Privacy, Security and Trust, 2008. PST'08. Sixth Annual Conference on. IEEE, p 240–245

  3. Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Annual international cryptology conference. Springer, Berlin Heidelberg, pp 213–229

    Google Scholar 

  4. Chaum D, Pedersen TP (1992) Wallet databases with observers. In: Annual international cryptology conference. Springer, Berlin Heidelberg, pp 89–105

    Google Scholar 

  5. Chen X, Li J, Huang X, Li J, Xiang Y, Wong DS (2014a) Secure outsourced attribute-based signatures. IEEE Trans Parallel Distrib Syst 25(12):3285–3294

    Article  Google Scholar 

  6. Chen X, Li J, Ma J, Tang Q, Lou W (2014b) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Parallel Distrib Syst 25(9):2386–2396

    Article  Google Scholar 

  7. Chevallier-Mames B, Coron JS, McCullagh N, Naccache D, Scott M (2010). Secure delegation of elliptic-curve pairing. In: International Conference on smart card research and advanced applications. Springer, Berlin Heidelberg, p 24–35

  8. Choon JC, Cheon JH (2003) An identity-based signature from gap Diffie-Hellman groups. In: International workshop on public key cryptography. Springer, Berlin Heidelberg, pp 18–30

    Google Scholar 

  9. Escala A, Herranz J, Morillo P (2011) Revocable attribute-based signatures with adaptive security in the standard model. In: International conference on cryptology in Africa. Springer, Berlin Heidelberg, pp 224–241

    Google Scholar 

  10. Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Annual cryptology conference. Springer, Berlin Heidelberg, pp 465–482

    Google Scholar 

  11. Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE Ciphertexts. In USENIX Security Symposium Vol. 2011, No. 3

  12. Guo P, Wang J, Geng XH, Kim CS, Kim JU (2014) A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology 15(6):929–935

    Google Scholar 

  13. Hohenberger S, Lysyanskaya A (2005) How to securely outsource cryptographic computations. In: Theory of cryptography conference. Springer, Berlin Heidelberg, pp 264–282

    Chapter  Google Scholar 

  14. Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354

    Article  Google Scholar 

  15. Li J, Kim K (2008) Attribute-based ring signatures. IACR Cryptology ePrint Archive 2008:394

    Google Scholar 

  16. Li J, Au MH, Susilo W, Xie D, Ren K (2010) Attribute-based signature and its applications. In: Proceedings of the 5th ACM symposium on information. ACM, Computer and Communications Security, pp 60–69

    Google Scholar 

  17. Liu JK, Baek J, Zhou J, Yang Y, Wong JW (2010) Efficient online/offline identity-based signature for wireless sensor network. Int J Inf Secur 9(4):287–296

    Article  Google Scholar 

  18. Maji HK, Prabhakaran M, Rosulek M (2008) Attribute-based signatures: achieving attribute-privacy and collusion-resistance. IACR Cryptology ePrint Archive, 2008, 328

  19. Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Kiayias A (ed) Cryptographers’ track at the RSA conference. Springer, Berlin Heidelberg, pp 376–392

  20. Matsumoto T, Kato K, Imai H (1988) Speeding up secret computations with insecure auxiliary devices. In: Conference on the theory and application of cryptography. Springer, New York, pp 497–506

    Google Scholar 

  21. Okamoto T, Takashima K (2011) Efficient attribute-based signatures for non-monotone predicates in the standard model. In: International workshop on public key cryptography. Springer, Berlin Heidelberg, pp 35–52

    Google Scholar 

  22. Ren Y, Ding N, Zhang X, Lu H, Gu D (2016a) Verifiable outsourcing algorithms for modular exponentiations with improved checkability. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, pp 293–303

  23. Ren Y, Ding N, Wang T, Lu H, Gu D (2016b) New algorithms for verifiable outsourcing of bilinear pairings. Sci China Inf Sci 59(9):99103

    Article  Google Scholar 

  24. Ren Y, Ding N, Zhang X, Lu H, Gu D (2016c) Identity-based encryption with verifiable outsourced revocation. Comput J 59(11):1659–1668

    Article  Google Scholar 

  25. Shahandashti SF, Safavi-Naini R (2009) Threshold attribute-based signatures and their application to anonymous credential systems. In: International conference on cryptology in Africa. Springer, Berlin Heidelberg, pp 198–216

    Google Scholar 

  26. Takabi H, Joshi JB, Ahn GJ (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6):24–31

    Article  Google Scholar 

  27. Tian H, Zhang F, Ren K. (2015) Secure bilinear pairing outsourcing made more efficient and flexible. In Proceedings of the 10th ACM symposium on information, Computer and Communications Security. ACM, p 417–426

  28. Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the 8th International Conference on Network and Service Management. International Federation for Information Processing, pp. 37–45

Download references

Acknowledgements

The work described in this paper was supported by the National Natural Science Foundation of China (Grant No. 61572309, 61525203).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanli Ren.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ren, Y., Jiang, T. Verifiable outsourced attribute-based signature scheme. Multimed Tools Appl 77, 18105–18115 (2018). https://doi.org/10.1007/s11042-017-4539-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4539-7

Keywords

Navigation