Decentralized Attribute-Based Signatures
نویسندگان
چکیده
We present the first decentralized multi-authority attributebased signature (DMA-ABS) scheme, in which no central authority and no trusted setup are required. The proposed DMA-ABS scheme for a large class of (non-monotone) predicates is fully secure (adaptive-predicate unforgeable and perfectly private) under a standard assumption, the decisional linear (DLIN) assumption, in the random oracle model. Our DMA-ABS scheme is comparably as efficient as the most efficient ABS scheme. As a by-product, this paper also presents an adaptively secure DMA functional encryption (DMA-FE) scheme under the DLIN assumption.
منابع مشابه
Authentication of Data Storage using Decentralized Access Control in Clouds
In this paper, we propose the secure data storage in clouds for a new decentralized access . The cloud verifies the authenticity of the series without knowing the user’s identity in the proposed scheme . Our feature is that only valid users can able to decrypt the stored information. It prevents from the replay attack . This scheme supports creation, modification, and reading the data stored in...
متن کاملDecentralized Traceable Attribute-Based Signatures
Attribute-based signatures allow a signer owning a set of attributes to anonymously sign a message w.r.t. some signing policy. A recipient of the signature is convinced that a signer with a set of attributes satisfying the signing policy has indeed produced the signature without learning the identity of the signer or which set of attributes was used in the signing. Traceable attribute-based sig...
متن کاملStronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
In this work, we revisit the notion of Decentralized Traceable Attribute-Based Signatures (DTABS) introduced by El Kaafarani et al. (CT-RSA 2014) and improve the state-of-the-art in three dimensions: Firstly, we provide a new stronger security model which circumvents some shortcomings in existing models. Our model minimizes the trust placed in attribute authorities and hence provides, among oth...
متن کاملA New Approach to Threshold Attribute Based Signatures
Inspired by developments in attribute based encryption and signatures, there has recently been a spurt of progress in the direction of threshold attribute based signatures (t-ABS). In this work we propose a novel approach to construct threshold attribute based signatures inspired by ring signatures. Threshold attribute based signatures, defined by a (t, n∗) threshold predicate, ensure that the ...
متن کاملUser Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption - Full Version
Recent trend towards cloud computing paradigm, smart devices and 4G wireless technologies has enabled seamless data sharing among users. Cloud computing environment is distributed and untrusted, hence data owners have to encrypt their data to enforce data confidentiality. The data confidentiality in a distributed environment can be achieved by using attribute-based encryption technique. Decentr...
متن کامل