609
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A study on the traceable attribute-based signature scheme provided with anonymous credentials

, , &
Article: 2287979 | Received 20 Sep 2023, Accepted 21 Nov 2023, Published online: 08 Jan 2024

References

  • Cao, D., Wang, X., Zhao, B., Su, J., & Hu, Q. (2012). Mediated attribute based signature scheme supporting key revocation. In 2012 8th international conference on information science and digital content technology (ICIDT2012) (Vol. 2, pp. 277–282). IEEE.
  • Chen, B., Xiang, T., Li, X., Zhang, M., & He, D. (2023). Efficient attribute-based signature with collusionresistance for internet of vehicles. IEEE Transactions on Vehicular Technology, 72(6), 7844–7856. https://doi.org/10.1109/TVT.2023.3240824
  • Cui, H., Deng, R. H., Liu, J. K., Yi, X., & Li, Y. (2018). Server-aided attribute-based signature with revocation for resource-constrained industrial internet of things devices. IEEE Transactions on Industrial Informatics, 14(8), 3724–3732. https://doi.org/10.1109/TII.2018.2813304
  • Ding, S., Zhao, Y., & Liu, Y. (2014). Efficient traceable attribute-based signature. In 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (pp. 582–589). IEEE.https://doi.org/10.1109/TrustCom.2014.74
  • Fu, X., Li, F., & Zeng, S. (2016). Oblivious transfer with fine grained access control from ciphertext policy attribute based encryption in the standard model. International Journal of Future Generation Communication and Networking, 9(1), 285–302. https://doi.org/10.14257/ijfgcn.2016.9.1.25
  • Garcia-Grau, F., Herrera-Joancomartí, J., & Dorca Josa, A. (2022). Attribute based pseudonyms: Anonymous and linkable scoped credentials. Mathematics, 10(15), 1–14. https://doi.org/10.3390/math10152548
  • Ge, A. J., Ma, C. G., & Zhang, Z. F. (2012). Attribute-based signature scheme with constant size signature in the standard model. IET Information Security, 6(2), 47–54. https://doi.org/10.1049/iet-ifs.2011.0094
  • Gu, K., Wang, K., & Yang, L. (2019). Traceable attribute-based signature. Journal of Information Security and Applications, 49, 1–13. https://doi.org/10.1016/j.jisa.2019.102400
  • Han, J., Susilo, W., Mu, Y., & Yan, J. (2012). Attribute-based oblivious access control. The Computer Journal, 55(10), 1202–1215. https://doi.org/10.1093/comjnl/bxs061
  • Herranz, J., Laguillaumie, F., Libert, B., & Rafols, C. (2012). Short attribute-based signatures for threshold predicates. In Cryptographers' track at the RSA conference (pp. 51–67). Springer. https://doi.org/10.1007/978-3-642-27954-6_4
  • Kakvi, S. A., Martin, K. M., Putman, C., & Quaglia, E. A. (2023). SoK: Anonymous credentials. In International conference on research in security standardisation (pp. 129–151). Springer. https://doi.org/10.1007/978-3-031-30731-7_6
  • Kang, J. N., Nyang, D. H., & Lee, K. H. (2009). Conditionally traceable pseudonym protocol based on oblivious transfer. Journal of The Korea Institute of Information Security and Cryptology, 19(1), 33–42. https://doi.org/10.13089/JKIISC.2009.19.1.33
  • Kang, Z., Li, J., Shen, J., Han, J., Zuo, Y., & Zhang, Y. (2023). TFS-ABS: Traceable and forward-Secure attribute-based signature scheme with constant-size. IEEE Transactions on Knowledge and Data Engineering, 35(9), 9514–9530. https://doi.org/10.1109/TKDE.2023.3241198
  • Kavin, B. P., & Ganapathy, S. (2021). A new digital signature algorithm for ensuring the data integrity in cloud using elliptic curves. The International Arab Journal of Information Technology, 18(2), 180–190. https://doi.org/10.34028/IAJIT/18/2/6
  • Koblitz, N. (2010). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203–209. http://dx.doi.org/10.1090/S0025-5718-1987-0866109-5
  • Li, J., Au, M. H., Susilo, W., Xie, D., & Ren, K. (2010). Attribute-based signature and its applications. In Proceedings of the 5th ACM symposium on information, computer and communications security (pp. 60–69). Association for Computing Machinery. https://doi.org/10.1145/1755688
  • Li, Y., Chen, X., Yin, Y., Wan, J., Zhang, J., Kuang, L., & Dong, Z. (2020). SDABS: A flexible and efficient multi-authority hybrid attribute-based signature scheme in edge environment. IEEE Transactions on Intelligent Transportation Systems, 22(3), 1892–1906. https://doi.org/10.1109/TITS.2020.3038910
  • Lian, Y., Xu, L., & Huang, X. (2013). Attribute-based signatures with efficient revocation. In 2013 5th international conference on intelligent networking and collaborative systems (pp. 573–577). IEEE. https://doi.org/10.1109/INCoS.2013.106
  • Liu, W., Zhang, Y., Mu, Y., Yang, G., & Tian, Y. (2018). Efficient traceable oblivious transfer and its applications. In Information security practice and experience: 14th international conference, ISPEC 2018 (pp. 25–27). Springer. https://doi.org/10.1007/978-3-319-99807-7_39
  • Lynn, B. (2010). The pairing-based cryptography (PBC) library, PBC Library. Retrieved March 8, 2023, from http://crypto.stanford.edu/pbc.
  • Ma, R., & Du, L. (2022). Efficient pairing-free attribute-based blind signature scheme based on ordered binary decision diagram. IEEE Access, 10, 114393–114401. https://doi.org/10.1109/ACCESS.2022.3217907
  • Maji, H. K., Prabhakaran, M., & Rosulek, M. (2011). Attribute-based signatures. In Cryptographers' track at the RSA conference (pp. 376–392). Springer. https://doi.org/10.1007/978-3-642-19074-2_24
  • Nyang, D. H., & Lee, K. H. (2006). Private pseudonym retrieval with controlled traceability. Journal of The Korea Institute of Information Security and Cryptology, 16(5), 113–118. https://doi.org/10.13089/JKIISC.2006.16.5.113
  • Oberko, P. S. K., Obeng, V. H. K. S., Xiong, H., & Kumari, S. (2022). A survey on attribute-based signatures. IET Information Security, Journal of Systems Architecture, 124, 1–21. https://doi.org/10.1016/j.sysarc.2022.102396
  • Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88–115. https://doi.org/10.1016/j.jnca.2016.11.027
  • Su, Q., Zhang, R., Xue, R., & Li, P. (2020). Revocable attribute-based signature for blockchain-based healthcare system. IEEE Access, 8, 127884–127896. https://doi.org/10.1109/ACCESS.2020.3007691
  • Su, Q., Zhang, R., Xue, R., You, S., & Gao, S. (2022). Distributed attribute-based signature with attribute dynamic update for smart grid. IEEE Transactions on Industrial Informatics, 19(9), 9424–9435. https://doi.org/10.1109/TII.2022.3228688
  • Sucasas, V., Mantas, G., Papaioannou, M., & Rodriguez, J. (2021). Attribute-based pseudonymity for privacy-preserving authentication in cloud services. IEEE Transactions on Cloud Computing, 11(1). https://doi.org/10.1109/TCC.2021.3084538
  • Sun, P. J. (2019). Privacy protection and data security in cloud computing: A survey, challenges, and solutions. IEEE Access, 7, 147420–14745. https://doi.org/10.1109/ACCESS.2019.2946185
  • Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: Issues, threats, and solutions. The Journal of Supercomputing, 76(2), 9493–9532. https://doi.org/10.1007/s11227-020-03213-1
  • Tan, H., Zheng, W., Guan, Y., & Lu, R. (2022). A privacy-preserving attribute-based authenticated keymanagement scheme for accountable vehicular communications. IEEE Transactions on Vehicular Technology, 72(3), 3622–3635. https://doi.org/10.1109/TVT.2022.3220410
  • Tate, S. R., & Vishwanathan, R. (2015). Expiration and revocation of keys for attribute-based signatures. Cryptology ePrint Archive, 153–169. https://doi.org/10.1007/978-3-319-20810-7_10
  • Wei, J., Huang, X., Liu, W., & Hu, X. (2016). Practical attribute-based signature: Traceability and revocability. The Computer Journal, 59(11), 1714–1734. https://doi.org/10.1093/comjnl/bxw045
  • Xu, L., & Zhang, F. (2010). Oblivious transfer with complex attribute-based access control. In Information Security and Cryptology, 370–395. https://doi.org/10.1007/978-3-642-24209-0_25
  • Yadav, V. K., Andola, N., Verma, S., & Venkatesan, S. (2022, July). A survey of oblivious transfer protocol. ACM Computing Surveys (CSUR), 54(10s), 1–37. https://doi.org/10.1145/3503045
  • Zhang, J., & Chen, J. (2023). Efficient traceable attribute-based signature with update-free revocationfor blockchain. The Computer Journal, 66(4), 842–865. https://doi.org/10.1093/comjnl/bxab199