Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers

作者: Wouter Lueks , Gergely Alpár , Jaap- Henk Hoepman , Pim Vullers

DOI: 10.1007/978-3-319-18467-8_31

关键词: AnonymityProcess (engineering)Computer scienceComputer securityRevocationScheme (programming language)Smart card

摘要: Attribute-based credentials allow a user to prove properties about herself anonymously. Revoking such credentials, which requires singling them out, is hard because it at odds with anonymity. All revocation schemes proposed date either sacrifice anonymity altogether, require the parties be online, or put high load on verifier. As result, these are too complicated for low-powered devices like smart cards they do not scale. We propose new scheme that has very low computational cost users and verifiers, does process updates. trade only limited, but well-defined, amount of make first practical efficient large scales fast enough cards.

参考文章(57)
Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi, Practical Multilinear Maps over the Integers international cryptology conference. ,vol. 2013, pp. 476- 493 ,(2013) , 10.1007/978-3-642-40041-4_26
Ron D. Rothblum, On the Circular Security of Bit-Encryption Theory of Cryptography. pp. 579- 598 ,(2013) , 10.1007/978-3-642-36594-2_32
Craig Gentry, Amit Sahai, Brent Waters, Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based international cryptology conference. ,vol. 2013, pp. 75- 92 ,(2013) , 10.1007/978-3-642-40041-4_5
Craig Gentry, Sergey Gorbunov, Shai Halevi, Graph-Induced Multilinear Maps from Lattices Theory of Cryptography. pp. 498- 527 ,(2015) , 10.1007/978-3-662-46497-7_20
Adeline Langlois, Damien Stehlé, Ron Steinfeld, None, GGHLite: More Efficient Multilinear Maps from Ideal Lattices theory and application of cryptographic techniques. pp. 239- 256 ,(2014) , 10.1007/978-3-642-55220-5_14
Mirosław Kutyłowski, Łukasz Krzywiecki, Przemysław Kubiak, Michał Koza, Restricted Identification Scheme and Diffie-Hellman Linking Problem Trusted Systems. pp. 221- 238 ,(2012) , 10.1007/978-3-642-32298-3_15
Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers, Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards cryptology and network security. ,vol. 2014, pp. 270- 289 ,(2014) , 10.1007/978-3-319-12280-9_18
Dan Boneh, Mark Zhandry, Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation Advances in Cryptology – CRYPTO 2014. ,vol. 2013, pp. 480- 499 ,(2014) , 10.1007/978-3-662-44371-2_27
Vipul Goyal, Divya Gupta, Amit Sahai, Concurrent Secure Computation via Non-Black Box Simulation international cryptology conference. ,vol. 2015, pp. 23- 42 ,(2015) , 10.1007/978-3-662-48000-7_2
Markus Rückert, Dominique Schröder, Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles information security and assurance. pp. 750- 759 ,(2009) , 10.1007/978-3-642-02617-1_76