ABS-PoNR: Attribute-Based Signature scheme with Proof of Non-Revocation

Authors

  • Shivani Goel Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India Author
  • Mridul Kumar Gupta Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India Author
  • Saru Kumari Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India Author

DOI:

https://doi.org/10.32628/CSEIT251117126

Keywords:

Attribute-Based Signature, Proof of Non-Revocation

Abstract

In this paper, we introduce a novel Attribute-Based Signature scheme with Proof of Non-Revocation (ABS-PoNR) that enhances security and fine-grained access control in dynamic environments. Our scheme extends traditional attribute-based signatures by incorporating a non-revocation mechanism for attributes and unique user identifiers (UUIDs). It ensures that signatures remain valid only if the signer’s attributes and UUIDs have not been revoked. The proof of non-revocation allows verifiers to check the revocation status without compromising privacy and rejects signature if the proof is invalid or attributes are revoked. Utilizing bilinear pairing-based cryptography, the ABS-PoNR scheme enables efficient and secure attribute-based signing. Our security analysis is based on the Computational Diffie-Hellman (CDH) assumption and proves the unforgeability of the scheme which makes it computationally infeasible to forge valid signatures. We also discuss the efficiency and practical applicability of the ABS-PoNR technique in scenarios requiring dynamic attribute management and frequent updates to access rights. It marks a significant advancement in attribute-based cryptography.

Downloads

Download data is not yet available.

References

Ateniese, Giuseppe, Kevin Fu, Matthew Green, and Susan Hohenberger. 2006. “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.” ACM Transactions on Information and System Security (TISSEC) 9 (1): 1–30. DOI: https://doi.org/10.1145/1127345.1127346

Boneh, Dan, Xavier Boyen, and Eu-Jin Goh. 2005. “Hierarchical Identity Based Encryption with Constant Size Ciphertext.” In Annual International Conference on the Theory and Applications of Cryptographic Techniques, 440–56. Springer. DOI: https://doi.org/10.1007/11426639_26

Boneh, Dan, Ben Lynn, and Hovav Shacham. 2004. “Short Signatures from the Weil Pairing.” Journal of Cryptology 17: 297–319. DOI: https://doi.org/10.1007/s00145-004-0314-9

Fischer, Marten, Alfred Scheerhorn, and Ralf Tönjes. 2019. “Using Attribute-Based Encryption on Iot Devices with Instant Key Revocation.” In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 126–31. IEEE. DOI: https://doi.org/10.1109/PERCOMW.2019.8730784

Ge, Chunpeng, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, and Liming Fang. 2021. “Revocable Attribute-Based Encryption with Data Integrity in Clouds.” IEEE Transactions on Dependable and Secure Computing 19 (5): 2864–72. DOI: https://doi.org/10.1109/TDSC.2021.3065999

Gu, Ke, Keming Wang, and Lulu Yang. 2019. “Traceable Attribute-Based Signature.” Journal of Information Security and Applications 49: 102400. DOI: https://doi.org/10.1016/j.jisa.2019.102400

Herranz, Javier, Fabien Laguillaumie, Benoı̂t Libert, and Carla Rafols. 2012. “Short Attribute-Based Signatures for Threshold Predicates.” In Cryptographers’ Track at the RSA Conference, 51–67. Springer. DOI: https://doi.org/10.1007/978-3-642-27954-6_4

Hong, Jiaojiao, Bo Liu, Qianyuan Sun, and Fagen Li. 2019. “A Combined Public-Key Scheme in the Case of Attribute-Based for Wireless Body Area Networks.” Wireless Networks 25: 845–59. DOI: https://doi.org/10.1007/s11276-017-1597-8

Hwang, Yong Woon, Taehoon Kim, Daehee Seo, and Im-Yeong Lee. 2024. “A Study on the Traceable Attribute-Based Signature Scheme Provided with Anonymous Credentials.” Connection Science 36 (1): 2287979. DOI: https://doi.org/10.1080/09540091.2023.2287979

Kang, Zhaozhe, Jiguo Li, Jian Shen, Jinguang Han, Yuting Zuo, and Yichen Zhang. 2023. “TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme with Constant-Size.” IEEE Transactions on Knowledge and Data Engineering 35 (9): 9514–30. DOI: https://doi.org/10.1109/TKDE.2023.3241198

Lai, Junzuo, Robert H Deng, Chaowen Guan, and Jian Weng. 2013. “Attribute-Based Encryption with Verifiable Outsourced Decryption.” IEEE Transactions on Information Forensics and Security 8 (8): 1343–54. DOI: https://doi.org/10.1109/TIFS.2013.2271848

Lewko, Allison, and Brent Waters. 2011. “Decentralizing Attribute-Based Encryption.” In Annual International Conference on the Theory and Applications of Cryptographic Techniques, 568–88. Springer. DOI: https://doi.org/10.1007/978-3-642-20465-4_31

Liu, Liu, Chingfang Hsu, Man Ho Au, Lein Harn, Jianqun Cui, and Zhuo Zhao. 2024. “A Revocable and Comparable Attribute-Based Signature Scheme from Lattices for IoMT.” Journal of Systems Architecture, 103222. DOI: https://doi.org/10.1016/j.sysarc.2024.103222

Maji, Hemanta, Manoj Prabhakaran, and Mike Rosulek. 2008. “Attribute Based Signatures: Achieving Attribute Privacy and Collusion-Resistance. 2008.” EPRINT Http://Eprint. Iacr. Org/2008/328.

Oberko, Prince Silas Kwesi, Victor-Hillary Kofi Setornyo Obeng, Hu Xiong, and Saru Kumari. 2022. “A Survey on Attribute-Based Signatures.” Journal of Systems Architecture 124: 102396. DOI: https://doi.org/10.1016/j.sysarc.2022.102396

Okamoto, Tatsuaki, and Katsuyuki Takashima. 2014. “Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model.” IEEE Transactions on Cloud Computing 2 (4): 409–21. DOI: https://doi.org/10.1109/TCC.2014.2353053

Sahai, Amit, and Brent Waters. 2005. “Fuzzy Identity-Based Encryption.” In Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, 457–73. Springer.

Wei, Jianghong, Xinyi Huang, Wenfen Liu, and Xuexian Hu. 2016. “Practical Attribute-Based Signature: Traceability and Revocability.” The Computer Journal 59 (11): 1714–34. DOI: https://doi.org/10.1093/comjnl/bxw045

Xiong, Hu, Yangyang Bao, Xuyun Nie, and Yakubu Issifu Asoor. 2019. “Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things.” IEEE Transactions on Industrial Informatics 16 (2): 1013–23. DOI: https://doi.org/10.1109/TII.2019.2921516

Yang, Kan, Xiaohua Jia, Kui Ren, Bo Zhang, and Ruitao Xie. 2013. “DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems.” IEEE Transactions on Information Forensics and Security 8 (11): 1790–1801. DOI: https://doi.org/10.1109/TIFS.2013.2279531

Yang, Tonghao, Bin Yu, Hengjun Wang, and Junquan Li. 2015. “Revocable Attribute-Based Ring Signature Scheme with Constant Size Signature.” In 2015 IEEE International Conference on Computer and Communications (ICCC), 100–104. IEEE. DOI: https://doi.org/10.1109/CompComm.2015.7387548

Yu, Shucheng, Cong Wang, Kui Ren, and Wenjing Lou. 2010. “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing.” In 2010 Proceedings IEEE INFOCOM, 1–9. Ieee. DOI: https://doi.org/10.1109/INFCOM.2010.5462174

Zhang, Jixin, and Jiageng Chen. 2023. “Efficient Traceable Attribute-Based Signature with Update-Free Revocation for Blockchain.” The Computer Journal 66 (4): 842–65. DOI: https://doi.org/10.1093/comjnl/bxab199

Zhao, Yang, Pengcheng Fan, Haoting Cai, Zhiguang Qin, and Hu Xiong. 2017. “Attribute-Based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in m-Healthcare.” Int. J. Netw. Secur. 19 (6): 1044–52.

Downloads

Published

20-10-2025

Issue

Section

Research Articles

How to Cite

[1]
Shivani Goel, Mridul Kumar Gupta, and Saru Kumari, “ABS-PoNR: Attribute-Based Signature scheme with Proof of Non-Revocation”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 11, no. 5, pp. 216–229, Oct. 2025, doi: 10.32628/CSEIT251117126.