Author:
Datta Pratish,Dutta Ratna,Mukhopadhyay Sourav
Abstract
AbstractThis paper presents the first attribute-based signature () scheme supporting signing policies representable by Turing machines (), based on well-studied computational assumptions. Our work supports arbitrarys as signing policies in the sense that the s can accept signing attribute strings of unbounded polynomial length and there is no limit on their running time, description size, or space complexity. Moreover, we are able to achieve input-specific running time for the signing algorithm. All other known expressive schemes could at most support signing policies realizable by either arbitrary polynomial-size circuits or s having a pre-determined upper bound on the running time. Consequently, those schemes can only deal with signing attribute strings whose lengths are a priori bounded, as well as suffers from the worst-case running time problem. On a more positive note, for the first time in the literature, the signature size of our scheme only depends on the size of the signed message and is completely independent of the size of the signing policy under which the signature is generated. This is a significant achievement from the point of view of communication efficiency. Our construction makes use of indistinguishability obfuscation () for polynomial-size circuits and certain -compatible cryptographic tools. Note that, all of these building blocks including for polynomial-size circuits are currently known to be realizable under well-studied computational assumptions.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference26 articles.
1. Ananth P., Jain A., Sahai A.: Indistinguishability obfuscation without multilinear maps: io from lwe, bilinear maps, and weak pseudorandomness. In: Cryptology ePrint Archive, Report 2018/615 (2018).
2. Ananth P., Jain A., Lin H., Matt C., Sahai A.: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification. In: CRYPTO 2019, pp. 284–332. Springer (2019).
3. Barak B., Goldreich O., Impagliazzo R., Rudich S., Sahai A., Vadhan S., Yan, K.: On the (im) possibility of obfuscating programs. In: CRYPTO 2001, pp. 1–18. Springer (2001).
4. Bellare M., Fuchsbauer G.: Policy-based signatures. In: PKC 2014, pp. 520–537. Springer (2014).
5. Boneh D., Waters B.: Constrained pseudorandom functions and their applications. In: ASIACRYPT 2013, pp. 280–300. Springer (2013).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Registered Attribute-Based Signature;Lecture Notes in Computer Science;2024