ABS-PoNR: Attribute-Based Signature scheme with Proof of Non-Revocation

Authors

  • Shivani Goel Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India Author
  • Mridul Kumar Gupta Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India Author
  • Saru Kumari Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India Author

Keywords:

Attribute-Based Signature, Proof of Non-Revocation

Abstract

In this paper, we introduce a novel Attribute-Based Signature scheme with Proof of Non-Revocation (ABS-PoNR) that enhances security and fine-grained access control in dynamic environments. Our scheme extends traditional attribute-based signatures by incorporating a non-revocation mechanism for attributes and unique user identifiers (UUIDs). It ensures that signatures remain valid only if the signer’s attributes and UUIDs have not been revoked. The proof of non-revocation allows verifiers to check the revocation status without compromising privacy and rejects signature if the proof is invalid or attributes are revoked. Utilizing bilinear pairing-based cryptography, the ABS-PoNR scheme enables efficient and secure attribute-based signing. Our security analysis is based on the Computational Diffie-Hellman (CDH) assumption and proves the unforgeability of the scheme which makes it computationally infeasible to forge valid signatures. We also discuss the efficiency and practical applicability of the ABS-PoNR technique in scenarios requiring dynamic attribute management and frequent updates to access rights. It marks a significant advancement in attribute-based cryptography.

Downloads

Download data is not yet available.

References

Ateniese, Giuseppe, Kevin Fu, Matthew Green, and Susan Hohenberger. 2006. “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.” ACM Transactions on Information and System Security (TISSEC) 9 (1): 1–30.

Boneh, Dan, Xavier Boyen, and Eu-Jin Goh. 2005. “Hierarchical Identity Based Encryption with Constant Size Ciphertext.” In Annual International Conference on the Theory and Applications of Cryptographic Techniques, 440–56. Springer.

Boneh, Dan, Ben Lynn, and Hovav Shacham. 2004. “Short Signatures from the Weil Pairing.” Journal of Cryptology 17: 297–319.

Fischer, Marten, Alfred Scheerhorn, and Ralf Tönjes. 2019. “Using Attribute-Based Encryption on Iot Devices with Instant Key Revocation.” In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 126–31. IEEE.

Ge, Chunpeng, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, and Liming Fang. 2021. “Revocable Attribute-Based Encryption with Data Integrity in Clouds.” IEEE Transactions on Dependable and Secure Computing 19 (5): 2864–72.

Gu, Ke, Keming Wang, and Lulu Yang. 2019. “Traceable Attribute-Based Signature.” Journal of Information Security and Applications 49: 102400.

Herranz, Javier, Fabien Laguillaumie, Benoı̂t Libert, and Carla Rafols. 2012. “Short Attribute-Based Signatures for Threshold Predicates.” In Cryptographers’ Track at the RSA Conference, 51–67. Springer.

Hong, Jiaojiao, Bo Liu, Qianyuan Sun, and Fagen Li. 2019. “A Combined Public-Key Scheme in the Case of Attribute-Based for Wireless Body Area Networks.” Wireless Networks 25: 845–59.

Hwang, Yong Woon, Taehoon Kim, Daehee Seo, and Im-Yeong Lee. 2024. “A Study on the Traceable Attribute-Based Signature Scheme Provided with Anonymous Credentials.” Connection Science 36 (1): 2287979.

Kang, Zhaozhe, Jiguo Li, Jian Shen, Jinguang Han, Yuting Zuo, and Yichen Zhang. 2023. “TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme with Constant-Size.” IEEE Transactions on Knowledge and Data Engineering 35 (9): 9514–30.

Lai, Junzuo, Robert H Deng, Chaowen Guan, and Jian Weng. 2013. “Attribute-Based Encryption with Verifiable Outsourced Decryption.” IEEE Transactions on Information Forensics and Security 8 (8): 1343–54.

Lewko, Allison, and Brent Waters. 2011. “Decentralizing Attribute-Based Encryption.” In Annual International Conference on the Theory and Applications of Cryptographic Techniques, 568–88. Springer.

Liu, Liu, Chingfang Hsu, Man Ho Au, Lein Harn, Jianqun Cui, and Zhuo Zhao. 2024. “A Revocable and Comparable Attribute-Based Signature Scheme from Lattices for IoMT.” Journal of Systems Architecture, 103222.

Maji, Hemanta, Manoj Prabhakaran, and Mike Rosulek. 2008. “Attribute Based Signatures: Achieving Attribute Privacy and Collusion-Resistance. 2008.” EPRINT Http://Eprint. Iacr. Org/2008/328.

Oberko, Prince Silas Kwesi, Victor-Hillary Kofi Setornyo Obeng, Hu Xiong, and Saru Kumari. 2022. “A Survey on Attribute-Based Signatures.” Journal of Systems Architecture 124: 102396.

Okamoto, Tatsuaki, and Katsuyuki Takashima. 2014. “Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model.” IEEE Transactions on Cloud Computing 2 (4): 409–21.

Sahai, Amit, and Brent Waters. 2005. “Fuzzy Identity-Based Encryption.” In Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, 457–73. Springer.

Wei, Jianghong, Xinyi Huang, Wenfen Liu, and Xuexian Hu. 2016. “Practical Attribute-Based Signature: Traceability and Revocability.” The Computer Journal 59 (11): 1714–34.

Xiong, Hu, Yangyang Bao, Xuyun Nie, and Yakubu Issifu Asoor. 2019. “Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things.” IEEE Transactions on Industrial Informatics 16 (2): 1013–23.

Yang, Kan, Xiaohua Jia, Kui Ren, Bo Zhang, and Ruitao Xie. 2013. “DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems.” IEEE Transactions on Information Forensics and Security 8 (11): 1790–1801.

Yang, Tonghao, Bin Yu, Hengjun Wang, and Junquan Li. 2015. “Revocable Attribute-Based Ring Signature Scheme with Constant Size Signature.” In 2015 IEEE International Conference on Computer and Communications (ICCC), 100–104. IEEE.

Yu, Shucheng, Cong Wang, Kui Ren, and Wenjing Lou. 2010. “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing.” In 2010 Proceedings IEEE INFOCOM, 1–9. Ieee.

Zhang, Jixin, and Jiageng Chen. 2023. “Efficient Traceable Attribute-Based Signature with Update-Free Revocation for Blockchain.” The Computer Journal 66 (4): 842–65.

Zhao, Yang, Pengcheng Fan, Haoting Cai, Zhiguang Qin, and Hu Xiong. 2017. “Attribute-Based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in m-Healthcare.” Int. J. Netw. Secur. 19 (6): 1044–52.

Downloads

Published

20-10-2025

Issue

Section

Research Articles

How to Cite

[1]
Shivani Goel, Mridul Kumar Gupta, and Saru Kumari, “ABS-PoNR: Attribute-Based Signature scheme with Proof of Non-Revocation”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 11, no. 5, pp. 216–229, Oct. 2025, Accessed: Nov. 01, 2025. [Online]. Available: https://ijsrcseit.technoscienceacademy.com/index.php/home/article/view/CSEIT251117126