Skip to main content
Erschienen in: International Journal of Information Security 2/2018

19.01.2017 | Regular Contribution

Dynamic reversed accumulator

verfasst von: Tsung-Min Kuo, Sung-Ming Yen, Meng-Che Han

Erschienen in: International Journal of Information Security | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Anonymous credential schemes have been widely employed to prove the authenticity of a member by revealing specific member attributes while concealing the real identity from the verifier. Furthermore, an accumulator is used to demonstrate the validity of the credential by providing a corresponding witness. In existing accumulator schemes, all credential holders must update their witnesses when a member joins or is revoked from the system, causing the schemes to become impractical. This paper examines the security of several recent accumulator schemes and proposes a novel approach, the dynamic reversed accumulator, which is more efficient than existing schemes because a corresponding witness can be updated when several members have been revoked.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ateniese, G., Tsudik, G.: Quasi-efficient revocation of group signatures. In: Proceedings of the 7th International Conference on Financial Cryptography—FC ’03, LNCS 2357, pp. 183–197. Springer (2003) Ateniese, G., Tsudik, G.: Quasi-efficient revocation of group signatures. In: Proceedings of the 7th International Conference on Financial Cryptography—FC ’03, LNCS 2357, pp. 183–197. Springer (2003)
2.
Zurück zum Zitat Au, M.H., Tsang, P.P., Susilo, W., Mu, Y.: Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. In: Proceedings of the Cryptographers’ Track at the RSA Conference 2009—CT-RSA ’09, LNCS 5473, pp. 295–308. Springer (2009) Au, M.H., Tsang, P.P., Susilo, W., Mu, Y.: Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. In: Proceedings of the Cryptographers’ Track at the RSA Conference 2009—CT-RSA  ’09, LNCS 5473, pp. 295–308. Springer (2009)
3.
Zurück zum Zitat Boneh, D., Boyen, X.: Short signatures without random oracles. In: Advances in Cryptology—EUROCRYPT ’04, LNCS 3027, pp. 56–73. Springer (2004) Boneh, D., Boyen, X.: Short signatures without random oracles. In: Advances in Cryptology—EUROCRYPT ’04, LNCS 3027, pp. 56–73. Springer (2004)
4.
Zurück zum Zitat Backes, M., Camenisch, J., Sommer, D.: Anonymous yet accountable access control. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 40–46 (2005) Backes, M., Camenisch, J., Sommer, D.: Anonymous yet accountable access control. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 40–46 (2005)
5.
Zurück zum Zitat Benaloh, J., de Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Advances in Cryptology—EUROCRYPT ’93, LNCS 765, pp. 274–285. Springer (1993) Benaloh, J., de Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Advances in Cryptology—EUROCRYPT ’93, LNCS 765, pp. 274–285. Springer (1993)
7.
Zurück zum Zitat Barić, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Advances in Cryptology—EUROCRYPT ’97, LNCS 1233, pp. 480–494. Springer (1997) Barić, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Advances in Cryptology—EUROCRYPT ’97, LNCS 1233, pp. 480–494. Springer (1997)
8.
Zurück zum Zitat Camenisch, J.: Efficient and generalized group signatures. In: Advances in Cryptology—EUROCRYPT ’97, LNCS 1233, pp. 465–479. Springer (1997) Camenisch, J.: Efficient and generalized group signatures. In: Advances in Cryptology—EUROCRYPT ’97, LNCS 1233, pp. 465–479. Springer (1997)
10.
Zurück zum Zitat Camenisch, J., Herreweghen, E.V.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security—CCS ’02, pp. 21–30 (2002) Camenisch, J., Herreweghen, E.V.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security—CCS ’02, pp. 21–30 (2002)
11.
Zurück zum Zitat Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography—PKC ’09, LNCS 5443, pp. 481–500. Springer (2009) Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography—PKC ’09, LNCS 5443, pp. 481–500. Springer (2009)
12.
Zurück zum Zitat Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Advances in Cryptology—CRYPTO ’02, LNCS 2442, pp. 61–76. Springer (2002) Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Advances in Cryptology—CRYPTO ’02, LNCS 2442, pp. 61–76. Springer (2002)
13.
Zurück zum Zitat Chen, L., Pedersen, T.P.: New group signature schemes. In: Advances in Cryptology—EUROCRYPT ’94, LNCS 950, pp. 171–181. Springer (1995) Chen, L., Pedersen, T.P.: New group signature schemes. In: Advances in Cryptology—EUROCRYPT ’94, LNCS 950, pp. 171–181. Springer (1995)
14.
Zurück zum Zitat Fujisaki, E., Okamoto, T.: Statistical zero knowledge protocols to prove modular polynomial relations. In: Advances in Cryptology—CRYPTO ’97, LNCS 1294, pp. 16–30. Springer (1997) Fujisaki, E., Okamoto, T.: Statistical zero knowledge protocols to prove modular polynomial relations. In: Advances in Cryptology—CRYPTO ’97, LNCS 1294, pp. 16–30. Springer (1997)
16.
Zurück zum Zitat Kim, H.J., Lim, J.I., Lee, D.H.: Efficient and secure member deletion in group signature schemes. In: Proceedings of the 3rd International Conference on Information Security and Cryptology—ICISC ’00, LNCS 2015, pp. 150–161. Springer (2001) Kim, H.J., Lim, J.I., Lee, D.H.: Efficient and secure member deletion in group signature schemes. In: Proceedings of the 3rd International Conference on Information Security and Cryptology—ICISC ’00, LNCS 2015, pp. 150–161. Springer (2001)
17.
Zurück zum Zitat Li, J., Li, N., Xue, R.: Universal accumulators with efficient nonmembership proofs. In: Proceedings of the 5th International Conference on Applied Cryptography and Network Security—ACNS ’07, LNCS 4521, pp. 253–269. Springer (2007) Li, J., Li, N., Xue, R.: Universal accumulators with efficient nonmembership proofs. In: Proceedings of the 5th International Conference on Applied Cryptography and Network Security—ACNS ’07, LNCS 4521, pp. 253–269. Springer (2007)
18.
Zurück zum Zitat Mashatan, A., Vaudenay, S.: A fully dynamic universal accumulator. Proc. Roman. Acad. 14, 269–285 (2013)MathSciNet Mashatan, A., Vaudenay, S.: A fully dynamic universal accumulator. Proc. Roman. Acad. 14, 269–285 (2013)MathSciNet
19.
Zurück zum Zitat Nguyen, L.: Accumulators from bilinear pairings and applications. In: Proceedings of the Cryptographers’ Track at the RSA Conference 2005—CT-RSA ’05, LNCS 3376, pp. 275–292. Springer (2005) Nguyen, L.: Accumulators from bilinear pairings and applications. In: Proceedings of the Cryptographers’ Track at the RSA Conference 2005—CT-RSA  ’05, LNCS 3376, pp. 275–292. Springer (2005)
20.
Zurück zum Zitat Song, D.X.: Practical forward secure group signature schemes. In: Proceedings of the 8th ACM Conference on Computer and Communications Security—CCS ’01, pp. 225–234 (2001) Song, D.X.: Practical forward secure group signature schemes. In: Proceedings of the 8th ACM Conference on Computer and Communications Security—CCS ’01, pp. 225–234 (2001)
21.
Zurück zum Zitat Sander, T., Ta-Shma, A., Yung, M.: Blind, auditable membership proofs. In: Proceedings of the 4th International Conference on Financial Cryptography—FC ’00, LNCS 1962, pp. 53–71. Springer (2001) Sander, T., Ta-Shma, A., Yung, M.: Blind, auditable membership proofs. In: Proceedings of the 4th International Conference on Financial Cryptography—FC ’00, LNCS 1962, pp. 53–71. Springer (2001)
Metadaten
Titel
Dynamic reversed accumulator
verfasst von
Tsung-Min Kuo
Sung-Ming Yen
Meng-Che Han
Publikationsdatum
19.01.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 2/2018
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-017-0360-6

Weitere Artikel der Ausgabe 2/2018

International Journal of Information Security 2/2018 Zur Ausgabe