Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography

被引:0
|
作者
Ma, Rui [1 ]
Du, Linyue [2 ]
机构
[1] Zhejiang Normal Univ, Xingzhi Coll, Jinhua, Peoples R China
[2] Zhejiang Normal Univ, Personnel Dept, Jinhua, Peoples R China
来源
PLOS ONE | 2024年 / 19卷 / 05期
关键词
SECURE; SIGNCRYPTION;
D O I
10.1371/journal.pone.0300153
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In an attribute-based strong designated verifier signature, a signer who satisfies the access structure signs the message and assigns it to a verifier who satisfies the access structure to verify it, which enables fine-grained access control for signers and verifiers. Such signatures are used in scenarios where the identity of the signer needs to be protected, or where the public verifiability of the signature is avoided and only the designated recipient can verify the validity of the signature. To address the problem that the overall overhead of the traditional attribute-based strong designated verifier signature scheme is relatively large, an efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography is proposed, as well as a security analysis of the new scheme given in the standard model under the difficulty of the elliptic curve discrete logarithm problem (ECDLP). On the one hand, the proposed scheme is based on elliptic curve cryptography and uses scalar multiplication on elliptic curves, which is computationally lighter, instead of bilinear pairing, which has a higher computational overhead in traditional attribute-based signature schemes. This reduces the computational overhead of signing and verification in the system, improves the efficiency of the system, and makes the scheme more suitable for resource-constrained cloud end-user scenarios. On the other hand, the proposed scheme uses LSSS (Linear Secret Sharing Schemes) access structure with stronger access policy expression, which is more efficient than the "And" gate or access tree access structure, making the computational efficiency of the proposed scheme meet the needs of resource-constrained cloud end-users.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Attribute-based strong designated-verifier signature scheme
    Fan, Chun-I
    Wu, Chien-Nan
    Chen, Wei-Kuei
    Sun, Wei-Zhe
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (04) : 944 - 959
  • [2] Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
    Ma, Rui
    Du, Linyue
    IEEE Access, 2022, 10 : 34221 - 34227
  • [3] Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
    Ma, Rui
    Du, Linyue
    IEEE ACCESS, 2022, 10 : 34221 - 34227
  • [4] Anonymous attribute-based designated verifier signature
    Blazy, Olivier
    Brouilhet, Laura
    Conchon, Emmanuel
    Klingler, Mathieu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 14 (10) : 1 - 11
  • [5] Anonymous attribute-based designated verifier signature
    Olivier Blazy
    Laura Brouilhet
    Emmanuel Conchon
    Mathieu Klingler
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 1 - 11
  • [6] Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings
    Islam, S. K. Hafizul
    Biswas, G. P.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2013, 25 (01) : 51 - 61
  • [7] Attribute-based Message Recovery Designated Verifier Proxy Signature Scheme in Telemedicine System
    Hu, Yu
    Zhang, Yi-Fan
    Huang, Hui
    Zhou, Yu-Ping
    Journal of Network Intelligence, 2022, 7 (01): : 101 - 113
  • [8] An efficient strong designated verifier signature scheme
    Saeednia, S
    Kremer, S
    Markowitch, O
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 40 - 54
  • [9] Lattice based strong designated verifier signature scheme
    Zhang P.
    Chi H.
    Li J.
    Shang Y.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2023, 49 (06): : 1294 - 1300
  • [10] Identity based strong designated verifier signature scheme
    Kancharla, Phani Kumar
    Gummadidala, Shailaja
    INFORMATICA, 2007, 18 (02) : 239 - 252