23 research outputs found
Attribute-Based Signatures
We introduce Attribute-Based Signatures (ABS), a versatile primitive that allows a party to sign a message with fine-grained control over identifying information. In ABS, a signer, who possesses a set of attributes from the authority, can sign a message with a predicate that is satisfied by his attributes. The signature reveals no more than the fact that a single user with some set of attributes satisfying the predicate has attested to the message. In particular, the signature hides the attributes used to satisfy the predicate and any identifying information about the signer (that could link multiple signatures as being from the same signer). Furthermore, users cannot collude to pool their attributes together. We give a general framework for constructing ABS schemes, then show several practical instantia-tions based on groups with bilinear pairing operations, under standard assumptions. We describe several practical problems that motivated this work, and how ABS can be used to solve them
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
An attribute-based signature with respect to a signing policy,
chosen ad-hoc by the signer, convinces the verifier that the signer
holds a subset of attributes satisfying that signing policy.
Ideally, the verifier must obtain no other information about the
identity of the signer or the attributes he holds. This primitive
has many applications in real scenarios requiring both
authentication and anonymity/privacy properties.
We propose in this paper the first attribute-based signature scheme
satisfying at the same time the following properties: (1) it admits
general signing policies, (2) it is proved secure against fully
adaptive adversaries, in the standard model, and (3) the number of
elements in a signature depends only on the size of the signing
policy. Furthermore, our scheme enjoys the additional property of
revocability: an external judge can break the anonymity of a
signature, when necessary. This property may be very interesting in
real applications where authorities are unwilling to allow full
anonymity of users