Attribute-based strong designated-verifier signature scheme

被引:11
作者
Fan, Chun-I [2 ]
Wu, Chien-Nan [2 ]
Chen, Wei-Kuei [1 ]
Sun, Wei-Zhe [2 ]
机构
[1] Ching Yun Univ, Dept Comp Sci & Informat Engn, Chungli, Taiwan
[2] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
关键词
Attribute-based signatures; Designated-verifier signatures; Cryptography; Information security; Bilinear pairings; PROOFS;
D O I
10.1016/j.jss.2011.11.1008
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In a strong designated-verifier signature scheme, only the verifier who is designated by a signer can check the validity of a signature via her/his private keys, which process contrasts with the public verifiability of a typical signature scheme. In applications in multi-user communication environments, a user may want to sign a document such that only some specified parties can confirm the signature. To do so, the signer can generate many designated-verifier signatures on a document for various designated verifiers, or she/he signs the document, encrypts the signature, and then sends the encrypted messages to the specified parties. However, the signer has to generate multiple signatures, as determined by the numbers of the designated verifiers in the former method and the latter method, signs a document and then encrypts it, that could lose their designation (which phenomenon is called source hiding). To solve the above problems, this study proposes an attribute-based strong designated-verifier signature scheme with source hiding, such that a signer needs to generate only one signature for a group of designated verifiers with attributes at specified values. To the best of the authors' knowledge, no attribute-based strong designated-verifier signature scheme has been formally presented before. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:944 / 959
页数:16
相关论文
共 31 条
  • [1] [Anonymous], 2016, HDB APPL CRYPTOGRAPH
  • [2] Beimel A, 2007, LECT NOTES COMPUT SC, V4392, P253
  • [3] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [4] Branden A., 2011, LAGRANGE INTERPOLATI
  • [5] CHAUM D, 1990, LECT NOTES COMPUT SC, V435, P212
  • [6] CHAUM D, 1991, LECT NOTES COMPUT SC, V473, P458
  • [7] DESMEDT Y, 1991, LECT NOTES COMPUT SC, V547, P205
  • [8] Gorantla MC, 2009, P 7 AUSTR INF SEC C, P21
  • [9] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [10] Huang XY, 2006, LECT NOTES COMPUT SC, V3903, P214, DOI 10.1007/11689522_20