OABS: Efficient Outsourced Attribute-Based Signature Scheme With Constant Size

被引:0
作者
Kang, Zhaozhe [1 ]
Li, Jiguo [2 ,3 ,4 ]
Zuo, Yuting [1 ]
Zhang, Yichen [1 ]
Han, Jinguang [5 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Minist Educ, Fuzhou 350117, Peoples R China
[3] Fujian Normal Univ, Sch Math & Stat, Minist Educ, Fuzhou 350117, Peoples R China
[4] Fujian Normal Univ, Key Lab Analyt Math & Applicat, Minist Educ, Fuzhou 350117, Peoples R China
[5] Southeast Univ, Sch Cyber Sci Engn, Nanjing 210096, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 23期
基金
中国国家自然科学基金;
关键词
Outsourcing; Standards; Security; Cloud computing; Computational efficiency; Encryption; Costs; Attribute-based signature (ABS); linear secret-sharing scheme (LSSS) access structure; outsourcing computing; privacy; unforgeability (UF); ENCRYPTION;
D O I
10.1109/JIOT.2024.3444827
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based signature (ABS) extends the identity-based signature, in which the unique identity for the signer is expanded into an attribute set composed of multiple attributes. The current ABS schemes supporting linear secret-sharing scheme (LSSS) matrix are flexible, but the computational cost of the signing algorithm is linear with the number of required attributes. Therefore, it is inappropriate to constrained devices (mobile phone, tablet, etc.) which have limited computation power. For the sake of solving the above issue, we devise an key-policy outsourced ABS (OABS) scheme supporting LSSS access structure. The designed scheme provides the outsourced key for the cloud service provider (CSP) which computes most of module exponentiation in the signing phase. The signer only needs to perform lightweight calculations to endorse a message. The presented OABS scheme is proved secure against the q-Diffie-Hellman exponentiation (q-DHE) assumption under the standard model. In addition, the devised OABS scheme fulfills the signer privacy. Moreover, the signature length for the designed scheme is invariable and unrelated to the number of required attributes, which reduces communication cost. Performance analysis demonstrates that the designed OABS scheme is more high efficiency in the aspect of the computational cost.
引用
收藏
页码:38167 / 38177
页数:11
相关论文
共 44 条
  • [1] Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Attribute-Based Messaging: Access Control and Confidentiality
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Khan, Arindam
    Gunter, Carl A.
    Khurana, Himanshu
    Prabhakaran, Manoj
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (04)
  • [4] Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage
    Chen, Ningyu
    Li, Jiguo
    Zhang, Yichen
    Guo, Yuyan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (01) : 175 - 184
  • [5] Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity
    Chen, Shaobo
    Li, Jiguo
    Zhang, Yichen
    Han, Jinguang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10441 - 10451
  • [6] Secure Outsourced Attribute-Based Signatures
    Chen, Xiaofeng
    Li, Jin
    Huang, Xinyi
    Li, Jingwei
    Xiang, Yang
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (12) : 3285 - 3294
  • [7] Efficient Fair Conditional Payments for Outsourcing Computations
    Chen, Xiaofeng
    Li, Jin
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) : 1687 - 1694
  • [8] Efficient Attribute Based Server-Aided Verification Signature
    Chen, Yu
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Zhang, Yichen
    Yi, Peng
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3224 - 3232
  • [9] Cheng Chen, 2013, Topics in Cryptology - CT-RSA 2013. The Cryptographers Track at the RSA Conference 2013. Proceedings, P50, DOI 10.1007/978-3-642-36095-4_4
  • [10] Attribute-based signature scheme with constant size signature in the standard model
    Ge, A-J
    Ma, C-G
    Zhang, Z-F
    [J]. IET INFORMATION SECURITY, 2012, 6 (02) : 47 - 54