Succinct Attribute-Based Signatures for Bounded-Size Circuits by Combining Algebraic and Arithmetic Proofs

Attribute-based signatures allow fine-grained attribute-based authentication and at the same time keep a signer’s privacy as much as possible. While there are constructions of attribute-based signatures allowing arbitrary circuits or Turing machines as an authentication policy, none of them is pract...

Full description

Saved in:
Bibliographic Details
Published inSecurity and Cryptography for Networks pp. 711 - 734
Main Author Sakai, Yusuke
Format Book Chapter
LanguageEnglish
Published Cham Springer International Publishing 2022
SeriesLecture Notes in Computer Science
Online AccessGet full text
ISBN9783031147906
3031147901
ISSN0302-9743
1611-3349
DOI10.1007/978-3-031-14791-3_31

Cover

Loading…
Abstract Attribute-based signatures allow fine-grained attribute-based authentication and at the same time keep a signer’s privacy as much as possible. While there are constructions of attribute-based signatures allowing arbitrary circuits or Turing machines as an authentication policy, none of them is practically very efficient. Some schemes have long signatures or long user secret keys which grow as the sizes of a policy or attributes grow. Some scheme relies on a vast Karp reduction which transforms public-key and secret-key operations into an arithmetic circuit. We propose an attribute-based signature scheme for bounded-size arbitrary arithmetic circuits with constant-size signatures and user secret keys without relying on such a Karp reduction. The scheme is based on bilinear groups and is proven secure in the generic bilinear group model. To achieve this we develop a new extension of SNARKs (succinct non-interactive arguments of knowledge). We formalize this extension as constrained SNARKs, which can be seen as a simplification of commit-and-prove SNARKs both in syntax and technique. In a constrained SNARK, one can force a prover to use a witness satisfying some constraint by announcing a succinct constraint string which encodes a constraint on a witness. If a proof is valid under some constraint string, it is ensured that the witness behind the proof satisfies the constraint that is behind the constraint string. By succinct, we mean that a constraint string has a constant length independent of the length of the plain description of the constraint, and notably a verifier need not know the (potentially long) plain description of the constraint for verifying a proof. We construct a constrained SNARK in the generic bilinear group model.
AbstractList Attribute-based signatures allow fine-grained attribute-based authentication and at the same time keep a signer’s privacy as much as possible. While there are constructions of attribute-based signatures allowing arbitrary circuits or Turing machines as an authentication policy, none of them is practically very efficient. Some schemes have long signatures or long user secret keys which grow as the sizes of a policy or attributes grow. Some scheme relies on a vast Karp reduction which transforms public-key and secret-key operations into an arithmetic circuit. We propose an attribute-based signature scheme for bounded-size arbitrary arithmetic circuits with constant-size signatures and user secret keys without relying on such a Karp reduction. The scheme is based on bilinear groups and is proven secure in the generic bilinear group model. To achieve this we develop a new extension of SNARKs (succinct non-interactive arguments of knowledge). We formalize this extension as constrained SNARKs, which can be seen as a simplification of commit-and-prove SNARKs both in syntax and technique. In a constrained SNARK, one can force a prover to use a witness satisfying some constraint by announcing a succinct constraint string which encodes a constraint on a witness. If a proof is valid under some constraint string, it is ensured that the witness behind the proof satisfies the constraint that is behind the constraint string. By succinct, we mean that a constraint string has a constant length independent of the length of the plain description of the constraint, and notably a verifier need not know the (potentially long) plain description of the constraint for verifying a proof. We construct a constrained SNARK in the generic bilinear group model.
Author Sakai, Yusuke
Author_xml – sequence: 1
  givenname: Yusuke
  orcidid: 0000-0002-5115-8292
  surname: Sakai
  fullname: Sakai, Yusuke
  email: yusuke.sakai@aist.go.jp
BookMark eNo1kEtOwzAURQ0UibZ0BwyyAYPtl489TCN-UiWQChIzK3bs4tImyHYGsJqupSsjLTB6uh9dPZ0JGrVdaxC6ouSaElLciIJjwAQopmkhKAYJ9ARNYHCOxtspGtOcDgGk4gzNhv5_RvIRGhMgDIsihQs0C2FNCGEFgKAwRttlr7VrdUzKGL1TfTR4XgfTJEu3auvYexMS2_n9bt71bWMavHTfJqmc172LIVFf-13VbZVrXbtKys3KKF87ndRts9-V3sX3rYmDfvZdZ8MlOrf1JpjZ352i17vbl-oBL57uH6tygdcsTyNWCoRljHOaK52lRHEG1LIss5YzmnFaFEITlmreZLrOcqoYYQRSEIpbajOYIva7Gz798JfxUnXdR5CUyANQOQCSIAdE8shPHoDCDyIZaJU
ContentType Book Chapter
Copyright The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
Copyright_xml – notice: The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
DOI 10.1007/978-3-031-14791-3_31
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
Computer Science
EISBN 303114791X
9783031147913
EISSN 1611-3349
Editor Galdi, Clemente
Jarecki, Stanislaw
Editor_xml – sequence: 1
  givenname: Clemente
  orcidid: 0000-0002-2988-700X
  surname: Galdi
  fullname: Galdi, Clemente
  email: clgaldi@unisa.it
– sequence: 2
  givenname: Stanislaw
  orcidid: 0000-0002-5055-2407
  surname: Jarecki
  fullname: Jarecki, Stanislaw
  email: stasio@ics.uci.edu
EndPage 734
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-j264t-bb39f228816bc540b8231f255ff821581779c024c8d5ca561b20203439b8f1f53
ISBN 9783031147906
3031147901
ISSN 0302-9743
IngestDate Tue Jul 29 20:22:00 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-j264t-bb39f228816bc540b8231f255ff821581779c024c8d5ca561b20203439b8f1f53
ORCID 0000-0002-5115-8292
PageCount 24
ParticipantIDs springer_books_10_1007_978_3_031_14791_3_31
PublicationCentury 2000
PublicationDate 2022
PublicationDateYYYYMMDD 2022-01-01
PublicationDate_xml – year: 2022
  text: 2022
PublicationDecade 2020
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 13th International Conference, SCN 2022, Amalfi (SA), Italy, September 12–14, 2022, Proceedings
PublicationTitle Security and Cryptography for Networks
PublicationYear 2022
Publisher Springer International Publishing
Publisher_xml – name: Springer International Publishing
RelatedPersons Hartmanis, Juris
Gao, Wen
Steffen, Bernhard
Bertino, Elisa
Goos, Gerhard
Yung, Moti
RelatedPersons_xml – sequence: 1
  givenname: Gerhard
  surname: Goos
  fullname: Goos, Gerhard
– sequence: 2
  givenname: Juris
  surname: Hartmanis
  fullname: Hartmanis, Juris
– sequence: 3
  givenname: Elisa
  surname: Bertino
  fullname: Bertino, Elisa
– sequence: 4
  givenname: Wen
  surname: Gao
  fullname: Gao, Wen
– sequence: 5
  givenname: Bernhard
  orcidid: 0000-0001-9619-1558
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 6
  givenname: Moti
  orcidid: 0000-0003-0848-0873
  surname: Yung
  fullname: Yung, Moti
SSID ssj0002733913
ssj0002792
Score 2.2482076
Snippet Attribute-based signatures allow fine-grained attribute-based authentication and at the same time keep a signer’s privacy as much as possible. While there are...
SourceID springer
SourceType Publisher
StartPage 711
Title Succinct Attribute-Based Signatures for Bounded-Size Circuits by Combining Algebraic and Arithmetic Proofs
URI http://link.springer.com/10.1007/978-3-031-14791-3_31
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV29btswECZcd0k7tE1btOkPODSToUKiLFEaOjhGiiBIvDgp0kkQKSpV0ziBLQ3O2Cfxs_jJetSRkuxkSRfBlgxRPn46fnfHuyPkC-dZALoxc1Q6jMFAyeCd85hwlGJcuiJzw7pk_ukkPDofHl8EF73e386upaoUX-Xdg3kl_zOrcA7mVWfJPmJmm5vCCfgM8wtHmGE4bpHfTTcr5nCYznO1-388X96Wpvp0vXNwgtu7G8Y8Ta-w8fTPalFdbSBlWklZzGQ5GJXY_ko5B7C2AREtLrHuZ12zYX_M9kfugW7DpDJnWtypwbiYy0pHHsQSr4J2EQV6Wv5c6pA0VoPFiyN42l_XOmlSpyfA4osaTVdaXnw7MbGMyU1ZbxEb2HYTVvt03ROMbbknrHtyy8HZ-tg27FlYT8E-47EbdtSgDzobrB5UgwrVdKiLL_pY7NSoXm6UNq7iHF2k9xaI7p4QGMzRo8GtEp2K_4RHQZ88HR0en_xo_HRA7_w6krtjv8cmMoVPpfOF7FN7WNGp_RedXM2HhrwXfa9JzdlL8lwnulCdgQJCe0V6arZLXli5UyP3XfLstCntu3hNri1c6BZcaAsXCnBZr7pQoRYqVCzXqwYmtIEJBZisVy1EKELkDTn_fng2PnJMzw7nN1Dr0hHCj3PGosgLhQRrQOgwcw52a55HwC4jj_NYAi-UURbIFMi7YDoWDrRYRLmXB_5b0p_dzNQ7QnMw5bkrQ5753tBVQqQq9XMxDBl3U5Gz92RgpZfot3CR2BLcIOvET0DWSS3rRMt671G__kB2WjB_JP1yXqlPwD5L8dkA5B-3B37y
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+and+Cryptography+for+Networks&rft.au=Sakai%2C+Yusuke&rft.atitle=Succinct+Attribute-Based+Signatures+for%C2%A0Bounded-Size+Circuits+by%C2%A0Combining+Algebraic+and%C2%A0Arithmetic+Proofs&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2022-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783031147906&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=711&rft.epage=734&rft_id=info:doi/10.1007%2F978-3-031-14791-3_31
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon