Attribute-Based Designated Combiner Transitive Signature Scheme

被引:0
|
作者
Hou, Shaonan [1 ]
Yang, Shaojun [1 ,2 ]
Lin, Chengjun [3 ]
机构
[1] Fujian Normal Univ, Sch Math & Stat, Fuzhou 350117, Peoples R China
[2] Fujian Normal Univ, Minist Educ, Key Lab Analyt Math & Applicat, Fuzhou 350117, Peoples R China
[3] Putian Univ, Fujian Key Lab Financial Informat Proc, Putian 351100, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute-based; transitive signature; fine-grained control;
D O I
10.3390/math12193070
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Transitive signatures allow any entity to obtain a valid signature of (i,k) by combining signatures of (i,j) and (j,k). However, the traditional transitive signature scheme does not offer fine-grained control over the combiner. To address this issue, we propose a formal definition of the attribute-based designated combiner transitive signature (ABDCTS) and its security model, where only entities whose inherent attributes meet the access policy can combine signatures. By introducing the fine-grained access control structure, control over the combiner is achieved. To demonstrate the feasibility of our primitive, this paper presents the first attribute-based designated combiner transitive signature scheme. Under an adaptive chosen-message attack, we prove its security based on the one-more CDH problem and the co-CDH problem, and that its algorithms have robustness.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Jin Li
    Qian Wang
    Cong Wang
    Kui Ren
    Mobile Networks and Applications, 2011, 16 : 553 - 561
  • [22] Attribute Based Multi-Signature Scheme in the Standard Model
    Liu, Ximeng
    Ma, Jianfeng
    Li, Qi
    Xiong, Jinbo
    Huang, Faliang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 738 - 742
  • [23] A Multi-authority Attribute-based Encryption Scheme with Pre-decryption
    Chen, Danwei
    Wan, Liangqing
    Wang, Chen
    Pan, Su
    Ji, Yuting
    2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 223 - 228
  • [24] Traceable attribute-based signcryption
    Wei, Jianghong
    Hu, Xuexian
    Liu, Wenfen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2302 - 2317
  • [25] Attribute-Based Signatures of Fiat-Shamir Type in Bilinear Groups: Scheme and Performance
    Anada, Hiroaki
    Anzai, Kyoya
    Fukumitsu, Masayuki
    2022 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON22), 2022, : 38 - 43
  • [26] A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
    Guo, Lifeng
    Li, Zhihao
    Yau, Wei-Chuen
    Tan, Syh-Yuan
    IEEE ACCESS, 2020, 8 : 26107 - 26118
  • [27] Attribute-Based Key-Insulated Encryption
    Chen, Jian-Hong
    Wang, Yong-Tao
    Chen, Ke-Fei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (02) : 437 - 449
  • [28] Security of Kuwakado-Tanaka transitive signature scheme for directed trees
    Yi, X
    Tan, CH
    Okamoto, E
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (04) : 955 - 957
  • [29] Hidden attribute-based signatures without anonymity revocation
    Li, Jin
    Kim, Kwangjo
    INFORMATION SCIENCES, 2010, 180 (09) : 1681 - 1689
  • [30] Attribute-Based Signcryption From Lattices in the Standard Model
    Yan, Jianhua
    Wang, Licheng
    Li, Muzi
    Ahmad, Haseeb
    Yue, Jun
    Yao, Wenbin
    IEEE ACCESS, 2019, 7 : 56039 - 56050