Policy-based Signatures for Predicates

نویسندگان

  • Fei Tang
  • Yousheng Zhou
چکیده

Policy-based Signatures (PBS), which were introduced by Bellare and Fuchsbauer, enable signers to sign messages that conform to some policy, yet privacy of the policy is maintained. Bellare et al. defined the policy in any NP language. In PBS schemes for NP language, one should have a valid witness for the policy checking and signing algorithms. In this work, we consider the case of PBS for P language which is a special case of NP language. In PBS schemes for P language, one can directly run the policy checking and signing algorithms without witness. We set policies as some boolean predicates and define the notion of PBS for predicates and its security. Next, for an important class of policy predicates described as (1dimensional) ranges (i.e., prefix predicate), we design a PBS scheme for such predicate based on tree-based signatures and analyze its application in some real-world scenarios. In addition, based on multilinear maps, we design three PBS schemes for more complex predicates, bit-fixing predicate, left/right predicate, and circuits predicate, respectively.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Backward Type Inference Generalises Type Checking

This paper presents a backward type analysis for logic programs. Given type signatures for a collection of selected predicates such as builtin or library predicates, the analysis infers type signatures for other predicates such that the execution of any query satisfying the inferred type signatures will not violate the type signatures for the selected predicates. Thus, the backward type analysi...

متن کامل

Short Attribute-Based Signatures for Threshold Predicates

Attribute-based cryptography is a natural solution for fine-grained access control with respect to security policies. In the case of attribute-based signatures (ABS), users obtain from an authority their secret keys as a function of the attributes they hold, with which they can later sign messages for any predicate satisfied by their attributes. A verifier will be convinced of the fact that the...

متن کامل

Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures

Homomorphic signatures are primitives that allow for public computations for a class of specified predicates over authenticated data. An enhanced privacy notion, called complete contexthiding security, was recently motivated by Attrapadung et al. (Asiacrypt’12). This notion ensures that a signature derived from any valid signatures is perfectly indistinguishable from a newly generated signature...

متن کامل

Computing on Authenticated Data for Adjustable Predicates

The notion of P-homomorphic signatures, introduced by Ahn et al. (TCC 2012), generalizes various approaches for public computations on authenticated data. For a given predicate P anyone can derive a signature for a message m′ from the signatures of a set of messages M , as long as P(M,m′) = 1. This definition hence comprises notions and constructions for concrete predicates P such as homomorphi...

متن کامل

Proofs of Knowledge for Non-Monotone Discrete-Log Formulae(Extended abstract)

This paper addresses the problem of defining and providing proofs of knowledge for a general class of exponentiation-based formulae. We consider general predicates built from modular exponentiations of secret values, combined by products and connected with the logical operators “AND”, “OR”, “NOT”. We first show how to deal with non-linear combination of secret exponents. Next,we extend the work...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2017