Abstract
We provide a formal security model for traceable attribute-based signatures. Our focus is on the more practical case where attribute management is distributed among different authorities rather than relying on a single central authority. By specializing our model to the single attribute authority setting, we overcome some of the shortcomings of the existing model for the same setting.
Our second contribution is a generic construction for the primitive which achieves a strong notion of security. Namely, it achieves CCA anonymity and its security is w.r.t. adaptive adversaries. Moreover, our framework permits expressive signing polices. Finally, we provide some instantiations of the primitive whose security reduces to falsifiable intractability assumptions without relying on idealized assumptions.
Our second contribution is a generic construction for the primitive which achieves a strong notion of security. Namely, it achieves CCA anonymity and its security is w.r.t. adaptive adversaries. Moreover, our framework permits expressive signing polices. Finally, we provide some instantiations of the primitive whose security reduces to falsifiable intractability assumptions without relying on idealized assumptions.
Original language | English |
---|---|
Title of host publication | Topics in Cryptology – CT-RSA 2014 |
Subtitle of host publication | The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings |
Editors | Josh Benalloh |
Publisher | Springer |
Pages | 327-348 |
Volume | 8366 |
ISBN (Electronic) | 978-3-319-04852-9 |
ISBN (Print) | 978-3-319-04851-2 |
DOIs | |
Publication status | Published - 2014 |
Event | CT-RSA 2014 - San Francisco, USA United States Duration: 24 Feb 2014 → 28 Feb 2014 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
ISSN (Electronic) | 0302-9743 |
Conference
Conference | CT-RSA 2014 |
---|---|
Country/Territory | USA United States |
City | San Francisco |
Period | 24/02/14 → 28/02/14 |
Keywords
- attribute-based signatures
- standard model
- security definitions