Double issuer-hiding attribute-based credentials from tag-based aggregatable mercurial signatures

Attribute-based anonymous credentials offer users fine-grained access control in a privacy-preserving manner. However, in such schemes obtaining a user's credentials requires knowledge of the issuer's public key, which obviously reveals the issuer's identity that must be hidden from u...

Full description

Saved in:
Bibliographic Details
Main Authors: SHI, Rui, YANG, Yang, LI, Yingjiu, FENG, Huamin, SHI, Guozhen, PANG, Hwee Hwa, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2024
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/9532
https://ink.library.smu.edu.sg/context/sis_research/article/10532/viewcontent/Double_Issuer_Hiding_2024_av.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-10532
record_format dspace
spelling sg-smu-ink.sis_research-105322024-11-15T07:33:06Z Double issuer-hiding attribute-based credentials from tag-based aggregatable mercurial signatures SHI, Rui YANG, Yang LI, Yingjiu FENG, Huamin SHI, Guozhen PANG, Hwee Hwa DENG, Robert H. Attribute-based anonymous credentials offer users fine-grained access control in a privacy-preserving manner. However, in such schemes obtaining a user's credentials requires knowledge of the issuer's public key, which obviously reveals the issuer's identity that must be hidden from users in certain scenarios. Moreover, verifying a user's credentials also requires the knowledge of issuer's public key, which may infer the user's private information from their choice of issuer. In this article, we introduce the notion of double issuer-hiding attribute-based credentials ( DIHAC ) to tackle these two problems. In our model, a central authority can issue public-key credentials for a group of issuers, and users can obtain attribute-based credentials from one of the issuers without knowing which one it is. Then, a user can prove that their credential was issued by one of the authenticated issuers without revealing which one to a verifier. We provide a generic construction, as well as a concrete instantiation for DIHAC based on structure-preserving signatures on equivalence classes (JOC's 19) and a novel primitive which we call tag-based aggregatable mercurial signatures. Our construction is efficient without relying on zero-knowledge proofs. We provide rigorous evaluations on personal laptop and smartphone platforms, respectively, to demonstrate its practicability. 2024-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9532 info:doi/10.1109/TDSC.2023.3314019 https://ink.library.smu.edu.sg/context/sis_research/article/10532/viewcontent/Double_Issuer_Hiding_2024_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Anonymous credentials mercurial signatures privacy preserving issuer hiding Information Security Theory and Algorithms
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Anonymous credentials
mercurial signatures
privacy preserving
issuer hiding
Information Security
Theory and Algorithms
spellingShingle Anonymous credentials
mercurial signatures
privacy preserving
issuer hiding
Information Security
Theory and Algorithms
SHI, Rui
YANG, Yang
LI, Yingjiu
FENG, Huamin
SHI, Guozhen
PANG, Hwee Hwa
DENG, Robert H.
Double issuer-hiding attribute-based credentials from tag-based aggregatable mercurial signatures
description Attribute-based anonymous credentials offer users fine-grained access control in a privacy-preserving manner. However, in such schemes obtaining a user's credentials requires knowledge of the issuer's public key, which obviously reveals the issuer's identity that must be hidden from users in certain scenarios. Moreover, verifying a user's credentials also requires the knowledge of issuer's public key, which may infer the user's private information from their choice of issuer. In this article, we introduce the notion of double issuer-hiding attribute-based credentials ( DIHAC ) to tackle these two problems. In our model, a central authority can issue public-key credentials for a group of issuers, and users can obtain attribute-based credentials from one of the issuers without knowing which one it is. Then, a user can prove that their credential was issued by one of the authenticated issuers without revealing which one to a verifier. We provide a generic construction, as well as a concrete instantiation for DIHAC based on structure-preserving signatures on equivalence classes (JOC's 19) and a novel primitive which we call tag-based aggregatable mercurial signatures. Our construction is efficient without relying on zero-knowledge proofs. We provide rigorous evaluations on personal laptop and smartphone platforms, respectively, to demonstrate its practicability.
format text
author SHI, Rui
YANG, Yang
LI, Yingjiu
FENG, Huamin
SHI, Guozhen
PANG, Hwee Hwa
DENG, Robert H.
author_facet SHI, Rui
YANG, Yang
LI, Yingjiu
FENG, Huamin
SHI, Guozhen
PANG, Hwee Hwa
DENG, Robert H.
author_sort SHI, Rui
title Double issuer-hiding attribute-based credentials from tag-based aggregatable mercurial signatures
title_short Double issuer-hiding attribute-based credentials from tag-based aggregatable mercurial signatures
title_full Double issuer-hiding attribute-based credentials from tag-based aggregatable mercurial signatures
title_fullStr Double issuer-hiding attribute-based credentials from tag-based aggregatable mercurial signatures
title_full_unstemmed Double issuer-hiding attribute-based credentials from tag-based aggregatable mercurial signatures
title_sort double issuer-hiding attribute-based credentials from tag-based aggregatable mercurial signatures
publisher Institutional Knowledge at Singapore Management University
publishDate 2024
url https://ink.library.smu.edu.sg/sis_research/9532
https://ink.library.smu.edu.sg/context/sis_research/article/10532/viewcontent/Double_Issuer_Hiding_2024_av.pdf
_version_ 1816859124619542528