A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics
スポンサーリンク
概要
- 論文の詳細を見る
Recently, cryptographic schemes based on the user's attributes have been proposed. An Attribute-Based Group Signature (ABGS) scheme is a kind of group signature scheme, where a user with a set of attributes can prove anonymously whether she has these attributes or not. An access tree is applied to express the relationships among some attributes. However, previous schemes did not provide a way to change an access tree. In this paper, we propose a dynamic ABGS scheme that can change an access tree. Our ABGS is efficient in that re-issuing of the attribute certificate previously issued for each user is not necessary. The number of calculations in a pairing does not depend on the number of attributes in both signing and verifying. Finally, we discuss how our ABGS can be applied to an anonymous survey for collection of attribute statistics.
- 一般社団法人情報処理学会の論文
- 2009-09-15
著者
-
Kazumasa Omote
Japan Advanced Institute Of Science And Technology (jaist)
-
Omote Kazumasa
Japan Advanced Inst. Of Sci. And Technol. (jaist)
-
Kazumasa Omote
School Of Information Science Japan Advanced Institute Of Science And Technology
-
Keita Emura
School Of Information Science Japan Advanced Institute Of Science And Technology
-
Atsuko Miyaji
School of Information Science, Japan Advanced Institute of Science and Technology
-
Atsuko Miyaji
School Of Information Science Japan Advanced Institute Of Science And Technology
関連論文
- A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics
- Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
- Consideration of Lightweight Chameleon Hash Function (2)
- Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point
- A Second-price Sealed-bid Auction with Public Verifiability
- An Anonymous Sealed-bid Auction with a Feature of Entertainment
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- Consideration of Lightweight Chameleon Hash Function (2)
- Consideration of Lightweight Chameleon Hash Function (2)
- Consideration of Lightweight Chameleon Hash Function (2)
- Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes