Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography

被引:0
|
作者
Ma, Rui [1 ]
Du, Linyue [2 ]
机构
[1] Zhejiang Normal Univ, Xingzhi Coll, Jinhua, Peoples R China
[2] Zhejiang Normal Univ, Personnel Dept, Jinhua, Peoples R China
来源
PLOS ONE | 2024年 / 19卷 / 05期
关键词
SECURE; SIGNCRYPTION;
D O I
10.1371/journal.pone.0300153
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In an attribute-based strong designated verifier signature, a signer who satisfies the access structure signs the message and assigns it to a verifier who satisfies the access structure to verify it, which enables fine-grained access control for signers and verifiers. Such signatures are used in scenarios where the identity of the signer needs to be protected, or where the public verifiability of the signature is avoided and only the designated recipient can verify the validity of the signature. To address the problem that the overall overhead of the traditional attribute-based strong designated verifier signature scheme is relatively large, an efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography is proposed, as well as a security analysis of the new scheme given in the standard model under the difficulty of the elliptic curve discrete logarithm problem (ECDLP). On the one hand, the proposed scheme is based on elliptic curve cryptography and uses scalar multiplication on elliptic curves, which is computationally lighter, instead of bilinear pairing, which has a higher computational overhead in traditional attribute-based signature schemes. This reduces the computational overhead of signing and verification in the system, improves the efficiency of the system, and makes the scheme more suitable for resource-constrained cloud end-user scenarios. On the other hand, the proposed scheme uses LSSS (Linear Secret Sharing Schemes) access structure with stronger access policy expression, which is more efficient than the "And" gate or access tree access structure, making the computational efficiency of the proposed scheme meet the needs of resource-constrained cloud end-users.
引用
收藏
页数:23
相关论文
共 50 条
  • [41] An Efficient Certificateless Designated Verifier Signature Scheme
    He, Debiao
    Chen, Jianhua
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (04) : 389 - 396
  • [42] An Efficient Strong Designated Verifier Signature Based on R-SIS Assumption
    Cai, Jie
    Jiang, Han
    Zhang, Pingyuan
    Zheng, Zhihua
    Lyu, Guangshi
    Xu, Qiuliang
    IEEE ACCESS, 2019, 7 : 3938 - 3947
  • [43] A Strong Designated-verifier Proxy Signature scheme
    Zhang, Bo
    Xu, Qiuliang
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 569 - 572
  • [44] Strong designated verifier signature scheme with message recovery
    Lee, Ii-Seon
    Chang, Jik Hyun
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 801 - +
  • [45] A Certificateless Verifiable Strong Designated Verifier Signature Scheme
    Han, Shu
    Xie, Mande
    Yang, Bailin
    Lu, Rongxing
    Bao, Haiyong
    Lin, Jianhong
    Hong, Hai-Bo
    Gu, Mian-Xue
    Han, Song
    IEEE ACCESS, 2019, 7 : 126391 - 126408
  • [46] Attribute-Based Sanitizable Signature Scheme with Strong Designated Verifier; [具有强指定验证者的属性基可净化签名方案]
    Li J.-G.
    Zhu L.-F.
    Shen J.
    Lu Y.
    Zhang Y.-C.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (09): : 1806 - 1819
  • [47] Provably secure blind ID-based strong designated verifier signature scheme
    Zhang, Ning
    Wen, Qiaoyan
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 358 - 362
  • [48] Pairing-based strong designated verifier proxy signature scheme with low cost
    Hsu, Chien-Lung
    Lin, Han-Yu
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 517 - 522
  • [49] Nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography
    Yuan, Ding
    Fan, Pingzhi
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2007, 42 (01): : 8 - 12
  • [50] On the Security of an Attribute-Based Signature Scheme
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Goi, Bok-Min
    U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2009, 62 : 161 - +