Toggle Main Menu Toggle Search

Open Access padlockePrints

MoniPoly—An Expressive q-SDH-Based Anonymous Attribute-Based Credential System

Lookup NU author(s): Dr Syh Yuan TanORCiD, Professor Thomas Gross

Downloads


Licence

This is the authors' accepted manuscript of a conference proceedings (inc. abstract) that has been published in its final definitive form by Springer, Cham, 2020.

For re-use rights please refer to the publisher's terms and conditions.


Abstract

Modern attribute-based anonymous credential (ABC) systems benefit from special encodings that yield expressive and highly efficient show proofs on logical statements. The technique was first proposed by Camenisch and Gross, who constructed an SRSA-based ABC system with prime-encoded attributes that offers efficient AND, OR and NOT proofs. While other ABC frameworks have adopted constructions in the same vein, the Camenisch-Gross ABC has been the most expressive and asymptotically most efficient proof system to date, even if it was constrained by the requirement of a trusted message-space setup and an inherent restriction to finite-set attributes encoded as primes. In this paper, combining a new set commitment scheme and an SDH-based signature scheme, we present a provably secure ABC system that supports show proofs for complex statements. This construction is not only more expressive than existing approaches, but it is also highly efficient under unrestricted attribute space due to its ECC protocols only requiring a constant number of bilinear pairings by the verifier; none by the prover. Furthermore, we introduce strong security models for impersonation and unlinkability under adaptive active and concurrent attacks to allow for the expressiveness of our ABC as well as for a systematic comparison to existing schemes. Given this foundation, we are the first to comprehensively formally prove the security of an ABC with expressive show proofs. Specifically, building upon the q-(co-)SDH assumption, we prove the security against impersonation with a tight reduction. Besides the set commitment scheme, which may be of independent interest, our security models can serve as a foundation for the design of future ABC systems.


Publication metadata

Author(s): Tan SY, Gross T

Editor(s): Moriai S; Wang H

Publication type: Conference Proceedings (inc. Abstract)

Publication status: Published

Conference Name: Advances in Cryptology – ASIACRYPT 2020

Year of Conference: 2020

Pages: 498-526

Online publication date: 05/12/2020

Acceptance date: 16/08/2020

Date deposited: 27/11/2020

Publisher: Springer, Cham

URL: https://doi.org/10.1007/978-3-030-64840-4_17

DOI: 10.1007/978-3-030-64840-4_17

Library holdings: Search Newcastle University Library for this item

Series Title: Lecture Notes in Computer Science

ISBN: 9783030648398


Share