Presentation | 2015-07-02 Attribute-Based Two-Tier Signatures Hiroaki Anada, Seiko Arita, Kouichi Sakurai, |
---|---|
PDF Download Page | ![]() |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al., in which a message is associated with a signing policy, where the signing policy is described as a boolean formula over a signers' attributes. Only when a signer's attributes satisfy the signing policy, the signer can make a legitimate signature on the message. On the other hand, a two-tier signature scheme is a digital signature scheme proposed in 2007 by Bellare et al., in which a signer receives two tiered secret keys sequentially, the latter of which is served as a one-time signing key at the timing of signing. Accordingly, two tiered public keys are issued sequentially. These two-tier keys fit the Fiat-Shamir signature and enables it to achieve security in the standard model. In this paper, we construct an attribute-based two-tier signature scheme that possesses the functions and features of both schemes. We start with constructing a $Sgm$-protocol for a boolean formula on a bundled witness. Then we construct a signature bundle scheme that is existentially unforgeable against chosen-message attacks under the Strong RSA assumption. Combining these building blocks, we obtain an attribute-based identification scheme. Finally, by applying the two-tiered keys method, we attain an ABTTS scheme that is existentially unforgeable against chosen-message attacks in the standard model under the Strong RSA assumption. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | digital signature / attribute-based / two-tier key / strong RSA assumption / standard model |
Paper # | ISEC2015-9,SITE2015-7,ICSS2015-19,EMM2015-17 |
Date of Issue | 2015-06-25 (ISEC, SITE, ICSS, EMM) |
Conference Information | |
Committee | IPSJ-CSEC / ISEC / SITE / ICSS / EMM / IPSJ-SPT |
---|---|
Conference Date | 2015/7/2(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | NAGOYA TRADE & INDUSTRY CENTER |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | / Yukiyasu Tsunoo(NEC) / Noriaki Yoshikai(Nihon Univ.) / Yutaka Miyake(KDDI R&D Labs.) / Akinori Ito(Tohoku Univ.) |
Vice Chair | / Masahiro Mambo(Kanazawa Univ.) / Kazuto Ogawa(NHK) / Hitoshi Okada(NII) / Tetsuya Morizumi(Toyo Networks & System Integration) / Takashi Nishide(Univ. of Tsukuba) / Yoshiaki Shiraishi(Kobe Univ.) / Masashi Unoki(JAIST) / Masaki Kawamura(Yamaguchi Univ.) |
Secretary | / Masahiro Mambo(AIST) / Kazuto Ogawa(Toshiba) / Hitoshi Okada(Kanagawa Univ.) / Tetsuya Morizumi(Kyushu Univ.) / Takashi Nishide(Mitsubishi Electric) / Yoshiaki Shiraishi(NII) / Masashi Unoki(Univ. of Electro-Comm.) / Masaki Kawamura(Nagasaki Univ.) |
Assistant | / Tetsuya Izu(Fujitsu Lab.) / Takaaki Mizuki(Tohoku Univ.) / Noritaka Yamashita(NEC) / Takahiro Haga(Gifu Shotoku Gakuen Univ.) / Katsunari Yoshioka(Yokohama National Univ.) / Kazunori Kamiya(NTT) / Motoi Iwata(Osaka Pref. Univ.) / Kazuhiro Kohno(Kansai Univ.) |
Paper Information | |
Registration To | Special Interest Group on Computer Security / Technical Committee on Information Security / Technical Committee on Social Implications of Technology and Information Ethics / Technical Committee on Information and Communication System Security / Technical Committee on Enriched MultiMedia / Special Interest Group on Security Psychology and Trust |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Attribute-Based Two-Tier Signatures |
Sub Title (in English) | |
Keyword(1) | digital signature |
Keyword(2) | attribute-based |
Keyword(3) | two-tier key |
Keyword(4) | strong RSA assumption |
Keyword(5) | standard model |
1st Author's Name | Hiroaki Anada |
1st Author's Affiliation | Institute of Systems, Information Technologies and Nanotechnologies(ISIT) |
2nd Author's Name | Seiko Arita |
2nd Author's Affiliation | Institute of Information Security(IISEC) |
3rd Author's Name | Kouichi Sakurai |
3rd Author's Affiliation | Faculty of Information Science and Electrical Engineering, Kyushu University(Kyushu University) |
Date | 2015-07-02 |
Paper # | ISEC2015-9,SITE2015-7,ICSS2015-19,EMM2015-17 |
Volume (vol) | vol.115 |
Number (no) | ISEC-119,SITE-120,ICSS-121,EMM-122 |
Page | pp.pp.1-8(ISEC), pp.1-8(SITE), pp.1-8(ICSS), pp.1-8(EMM), |
#Pages | 8 |
Date of Issue | 2015-06-25 (ISEC, SITE, ICSS, EMM) |