Skip to main content
Log in

Attribute-Based Signature with Policy-and-Endorsement Mechanism

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

In this paper a new signature scheme, called Policy-Endorsing Attribute-Based Signature, is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption. This signature provides a policy-and-endorsement mechanism. In this mechanism a single user, whose attributes satisfy the predicate, endorses the message. This signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the signer. The security of this signature, selfless anonymity and existential unforgeability, is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Boneh D, Hamburg M. Generalized identity based and broadcast encryption schemes. In Proc. the 14th Int. Conf. the Theory and Application of Cryptology and Information Security, Melbourne, Australia, Dec. 7-11, 2008, pp.455–470.

  2. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In Proc. the IEEE Symposium on Security and Privacy, Oakland, USA, May 20-23, 2007, pp.321–334.

  3. Boneh D, Boyen X, Shacham H. Short group signatures. In Proc. the 24th Annual International Cryptology Conference, Santa Barbara, USA, Aug. 15-19, 2004, pp.41–55.

  4. Wei P, Wang X, Zheng Y. Public key encryption without randomoracle made truly practical. In Proc. the 11th Int. Conf. Information and Communications Security (ICICS), Beijing, China, Dec. 14-17, 2009, pp.107–120.

  5. Sahai A, Waters B. Fuzzy identity-based encryption. In Proc. the 24th Annual Int. Conf. the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, pp.457–473.

  6. Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In Proc. the 13th ACM Conf. Computer and Communications Security, Virginia, USA, Oct. 30-Nov. 3, 2006, pp.89–98.

  7. Shahandashti S-F, Safavi-Naini R. Threshold attribute-based signatures and their application to anonymous credential systems. In Proc. the 2nd Int. Conf. Cryptology in Africa, Gammarth, Tunisia, Jun. 21-25, 2009, pp.198–216.

  8. Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. In Proc. the 35th International Colloquium, Reykjavik, Iceland, Jul. 7-11, 2008, pp.579–591.

  9. Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Technical Report, Cryptology ePrint archive: Report 2008/290, 2008, http://eprint.iacr.org/2008/290.

  10. Khader D. Attribute based group signatures. Technical Report, Cryptology ePrint Archive, Report 2007/159, 2007, http://eprint.iacr.org/2007/159.

  11. Yuan E, Tong J. Attributed based access control (abac) for Web services. In Proc. the 2005 IEEE Int. Conf. Web Services, Orlando, USA, July 11-15, 2005, pp.561–569.

  12. Adelsbach A, Huber U, Sadeghi A-R. Property-based broadcast encryption for multi-level security policies. In Proc. the 8th International Conference on Information Security and Cryptology (ICISC), Seoul, Korea, Dec. 1-2, 2005, pp.15–31.

  13. Adelsbach A, Greveler U. A broadcast encryption scheme with free-riders but unconditional security. In Proc. the First International Conference on Digital Rights Management: Technologies, Issues, Challenges and Systems (DRMTICS), Sydney, Australia, Oct. 31-Nov. 2, 2005, pp.246–257.

  14. Kapadia A, Tsang P P, Smith S W. Attribute-based publishing with hidden credentials and hidden policies. In Proc. the 2007 Network and Distributed System Security Symposium, California, USA, Feb. 28-Mar. 2, 2007, The Internet Society.

  15. Huang D, Verma M. Aspe: Attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks, 2009, 7(8): 1526–1535.

    Article  Google Scholar 

  16. Barreto P S L M, Galbraith S D, O’Eigeartaigh C, Scott M Efficient pairing computation on supersingular abelian varieties. Des. Codes Cryptography, 2007, 42(3): 239–271.

    Article  MATH  Google Scholar 

  17. Beuchat J-L, Brisebarre N, Detrey J, Okamoto E. Arithmetic operators for pairing-based cryptography. In Proc. the 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Vienna, Austria, Sept. 10-13, 2007, pp.239–255.

  18. Hu H, Hu L, Feng D. On a class of pseudo-random sequences from elliptic curves over finite fields. IEEE Transactions on Information Theory, 2007, 53(7): 2598–2605.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Zhu.

Additional information

This paper is supported by the National Nature Science Foundation of China under Grant No. 10990011, the National Science Foundation of US under Grant No. CCF-0725340, the National Development and Reform Commission under the project of “A Monitoring Platform for Web Safe Browsing”, and China Next Generation Internet CNGI Project under Grant No. CNGI-09-01-12.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, HX., Zhu, Y., Feng, RQ. et al. Attribute-Based Signature with Policy-and-Endorsement Mechanism. J. Comput. Sci. Technol. 25, 1293–1304 (2010). https://doi.org/10.1007/s11390-010-9406-1

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-010-9406-1

Keywords

Navigation