Abstract
Anonymous authentication is very useful to protect the users’ identity privacy in distributed environment, such as in cloud computing. With the anonymous property, attribute-based signature (ABS) provides a cryptographic tool to construct a secure authentication scheme. In an attribute-based signature scheme, a signer owning a set of attributes is able to sign anonymously message with regarding to a policy, while the signatures are kept unforgeable even in the case of collusion. In this paper, we provide a novel construction of key-policy ABS for general circuits. Our construction is based on the correlation-relaxed two-to-one recoding (CR-TOR), which can be instantiated from the existence of multilinear maps. Due to the key indistinguishability property of the CR-TOR system, we prove that our scheme is selective unforgeability in the standard model under the k-Multilinear Computational Diffie-Hellman (k-MCDH) assumption. At the same time, the proposed scheme also holds the property of perfect privacy. Our framework based on CR-TOR leads to a circuit-ABS scheme that is conceptually different from the existing construction in the multilinear maps setting.

Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Chunsheng G (2015) Multilinear maps using ideal lattices without encodings of zero. Report, Cryptology ePrint Archive, Report 2015/269, 2015. http://eprint.iacr.org
Ding S, Zhao Y, Liu Y (2014) Efficient traceable attribute-based signature. In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on, IEEE, pp 582–589
Escala A, Herranz J, Morillo P (2011) Revocable attribute-based signatures with adaptive security in the standard model. In: Progress in Cryptology—AFRICACRYPT 2011, Springer, Berlin, Lecture Notes in Computer Science, vol 6737, pp 224–241. doi:10.1007/978-3-642-21969-6_14
Garg S, Gentry C, Halevi S (2013a) Candidate multilinear maps from ideal lattices. In: Advances in Cryptology—EUROCRYPT 2013, Springer, Berlin, Lecture Notes in Computer Science, vol 7881, pp 1–17. doi:10.1007/978-3-642-38348-9_1
Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013b) Attribute-based encryption for circuits from multilinear maps. In: Advances in Cryptology—CRYPTO 2013, Springer, Berlin, Lecture Notes in Computer Science, vol 8043, pp 479–499. doi:10.1007/978-3-642-40084-1_27
Garg S, Gentry C, Halevi S, Zhandry M (2014) Fully secure attribute based encryption from multilinear maps. Report, Cryptology ePrint Archive, Report 2014/622, 2014. http://eprint.iacr.org
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security. ACM, Alexandria, Virginia, USA, pp 89–98. doi:10.1145/1180405.1180418
Goyal V, Pandey O, Sahai A, Waters B (2013) Attribute-based encryption for circuits. In: Proceedings of the forty-fifth annual ACM symposium on Theory of computing. ACM, Palo Alto, USA, pp 545–554. doi:10.1145/2488608.2488677
Herranz J, Laguillaumie F, Libert B, Ràfols C (2012) Short attribute-based signatures for threshold predicates. In: Topics in cryptology—CT-RSA 2012, Springer, Berlin, Lecture Notes in Computer Science, vol 7178, pp 51–67. doi:10.1007/978-3-642-27954-6_4
Hu Y, Jia H (2015) Cryptanalysis of ggh map. Report, Cryptology ePrint Archive, Report 2015/301 2015. http://eprint.iacr.org
Jin L, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inform Sci 180(9):1681–1689. doi:10.1016/j.ins.2010.01.008
Jin L, Au MH, Susilo W, Xie D, Ren K (2010) Attribute-based signature and its applications. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ACM, pp 60–69. doi:10.1145/1755688.1755697
Jin L, Wang Q, Wang C, Ren K (2011) Enhancing attribute-based encryption with attribute hierarchy. Mob Netw Appl 16(5):553–561. doi:10.1007/s11036-010-0233-y
Jin L, Xinyi H, Jingwei L, Xiaofeng C, Yang X (2014) Securely outsourcing attribute-based encryption with checkability. Parallel Distrib Syst IEEE Trans 25(8):2201–2210. doi:10.1109/TPDS.2013.271
Kaafarani A, Ghadafi E, Khader D (2014) Decentralized traceable attribute-based signatures. In: Topics in Cryptology—CT-RSA 2014, Springer, Berlin, Lecture Notes in Computer Science, vol 8366, pp 327–348. doi:10.1007/978-3-319-04852-9_17
Kiyomoto S, Fukushima K, Miyake Y (2014) Security issues on it systems during disasters: a survey. J Ambient Intell Humaniz Comput 5(2):173–185. doi:10.1007/s12652-013-0177-8
Maji H, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Topics in Cryptology—CT-RSA 2011, Springer, Berlin, Lecture Notes in Computer Science, vol 6558, pp 376–392. doi:10.1007/978-3-642-19074-2_24
Maji HK, Prabhakaran M, Rosulek M (2008) Attribute-based signatures: Achieving attribute-privacy and collusion-resistance. IACR Cryptology ePrint Archive 2008:328
Mao X, Chen K, Long Y, Wang L (2014) Attribute-based signature on lattices. J Shanghai Jiaotong Univ 19:406–411. doi:10.1007/s12204-014-1516-4
Ogiela MR, Urszula O (2012) Linguistic protocols for secure information management and sharing. Comput Math Appl 63(2):564–572. doi:10.1016/j.camwa.2011.10.038
Okamoto T, Takashima K (2011) Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Public Key Cryptography—PKC 2011, Springer, Berlin, Lecture Notes in Computer Science, vol 6571, pp 35–52. doi:10.1007/978-3-642-19379-8_3
Okamoto T, Takashima K (2013) Decentralized attribute-based signatures. In: Public-Key Cryptography—PKC 2013, Springer, Berlin Heidelberg, Lecture Notes in Computer Science, vol 7778, pp 125–142. doi:10.1007/978-3-642-36362-7_9
Pandey O, Ramchen K, Waters B (2014) Relaxed two-to-one recoding schemes. Security and Cryptography for Networks, Springer International Publishing, Lecture Notes in Computer Science, pp 8642:57–76. doi:10.1007/978-3-319-10879-7_4
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology-EUROCRYPT 2005, Springer, Berlin, Lecture Notes in Computer Science, vol 3494, pp 457–473, doi:10.1007/11426639_27
Shahandashti S, Safavi-Naini R (2009) Threshold attribute-based signatures and their application to anonymous credential systems. In: Progress in Cryptology—AFRICACRYPT 2009, Springer, Berlin Heidelberg, Lecture Notes in Computer Science, vol 5580, pp 198–216. doi:10.1007/978-3-642-02384-2_13
Takabi H, James J, Ahn J (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6):24–31. doi:10.1109/msp.2010.186
Tang F, Li H, Liang B (2014) Attribute-based signatures for circuits from multilinear maps. Information Security, Springer International Publishing, Lecture Notes in Computer Science, pp 8783:54–71. doi:10.1007/978-3-319-13257-0_4
Wagner D (2014) Key management. Report, http://www-inst.cs.berkeley.edu/cs161/sp14/notes/3.21.pki
Wang Q, Chen S (2015) Attribute-based signature for threshold predicates from lattices. Secur Commun Netw 8(5):811–821. doi:10.1002/sec.1038
Acknowledgments
This work has been supported by the National Natural Science Foundation of China (No. 61374180, 61373136, 61401226); the Research Foundation for Humanities and Social Sciences of Ministry of Education, China (No. 12YJAZH120, 14YJAZH023); the Natural Science Foundation of Universities of Jiangsu Province (No. 13KJB520005), the Innovation and Research Joint Funding of Jiangsu Province(No. BY2014038-03); the Changzhou Applied Basic Research projects (No. CJ20140040) and the Qinlan Projects of Jiangsu Province(No. KYQ14004), Fundamental Research Funds for the Central Universities (South China University of Technology)(No. 2014ZM0032).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jing, Z., Jiang, G., Gu, C. et al. Anonymous authentication for circuits from correlation-relaxed two-to-one recoding. J Ambient Intell Human Comput 7, 153–161 (2016). https://doi.org/10.1007/s12652-015-0306-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-015-0306-7