• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhou Quan, Chen Minhui, Wei Kaijun, Zheng Yulong. Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden[J]. Journal of Computer Research and Development, 2025, 62(4): 1065-1074. DOI: 10.7544/issn1000-1239.202330744
Citation: Zhou Quan, Chen Minhui, Wei Kaijun, Zheng Yulong. Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden[J]. Journal of Computer Research and Development, 2025, 62(4): 1065-1074. DOI: 10.7544/issn1000-1239.202330744

Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden

Funds: This work was supported by the National Key Research and Development Program of China (2021YFA1000600).
More Information
  • Author Bio:

    Zhou Quan: born in 1971. PhD, associate professor. His main research interests include information security and cloud computing

    Chen Minhui: born in 1998. Master candidate. His main research interests include attribute encryption and access control

    Wei Kaijun: born in 1999. Master candidate. His main research interests include access control and information security

    Zheng Yulong: born in 2000. Master candidate. His main research interests include cryptography and information security

  • Received Date: September 11, 2023
  • Revised Date: October 10, 2024
  • Accepted Date: October 15, 2024
  • Available Online: October 21, 2024
  • Traceable attribute-based signature (TABS) inherits the merits of attribute-based signature and can trace the real identity of the signer through a trusted third party, avoiding the abuse of anonymity of attribute-based signature. At present, there are very few signature-policy attribute-based signature (SP-ABS) schemes that support traceability in one-to-many authentication scenario, and most of the existing schemes suffer from efficiency and security deficiencies, for example, the computational complexity of the verification phase is linearly related to the number of attributes, which is inefficient. Meanwhile, the fact that the policy is provided directly by the verifier to the signer can easily lead to policy privacy leakage. To solve the above problems, a traceable attribute-based signature scheme supporting policy hiding based on SM9 is proposed in this paper. The scheme uses a linear secret sharing scheme (LSSS) with attribute name and attribute value splitting to construct the access structure, supports partial hiding of the policies, and can protect the policy privacy of the verifier while protecting the signer’s identity privacy and attribute privacy. In the verification phase, the scheme only requires constant order bilinear pairing operations and exponential operations, which can achieve efficient fine-grained access control. Finally, the scheme is proved to be unforgeable under the random oracle model by the q-strong Diffie-Hellman (q-SDH) hard problem.

  • [1]
    Maji K, Prabhakaran M, Rosulek M. Attribute-based signatures[C]//Proc of the 11th Int Conf on Topics in Cryptology. Berlin: Springer, 2011: 376−392
    [2]
    Escala A, Herranz J, Morillo P. Revocable attribute-based signatures with adaptive security in the standard model[C]//Proc of the 4th Int Conf on the Theory and Application of Cryptographic Techniques in Africa. Berlin: Springer, 2011: 224−241
    [3]
    Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//Proc of the 28th IEEE Symp on Security and Privacy (SP’07). Los Alamitos, CA: IEEE Computer Society, 2007: 321−334
    [4]
    Su Jinshu, Cao Dan, Zhao Baokang, et al. ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of things[J]. Future Generation Computer Systems, 2014, 33: 11−18 doi: 10.1016/j.future.2013.10.016
    [5]
    Wang Changji, Li Wentao. An efficient attribute-based signature scheme with claim-predicate mechanism[J]. International Journal of Grid and Utility Computing, 2013, 4(2/3): 151−159 doi: 10.1504/IJGUC.2013.056251
    [6]
    Rao Y S, Dutta R. Bandwidth-efficient attribute-based key-insulated signatures with message recovery[J]. Information Sciences, 2016, 369: 648−673 doi: 10.1016/j.ins.2016.07.039
    [7]
    国家密码管理局. GM/T 0044—2016 SM9标识密码算法[S]. 北京:中国标准出版社,2016

    State Cryptography Administration. GM/T 0044—2016 Identity-based cryptographic algorithms SM9[S]. Beijing: Standard Press of China, 2016 (in Chinese)
    [8]
    Cheung L, Newport C. Provably secure ciphertext policy ABE[C]//Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007: 456−465
    [9]
    Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006: 89−98
    [10]
    Goyal V, Jain A, Pandey O, et al. Bounded ciphertext policy attribute based encryption[C]//Proc of the 35th Int Colloquium on Automata, Languages, and Programming. Berlin: Springer, 2008: 579−591
    [11]
    Zhang Yan, Feng Dengguo, Zhang Zhengfeng, et al. On the security of an efficient attribute-based signature[C]//Proc of Int Conf on Network and System Security. Berlin: Springer, 2013: 381−392
    [12]
    Xiong Hu, Bao Yangyang, Nie Xuyun, et al. Server-aided attribute-based signature supporting expressive access structures for industrial Internet of things[J]. IEEE Transactions on Industrial Informatics, 2019, 16(2): 1013−1023
    [13]
    Su Qianqian, Zhang Rui, Xue Rui, et al. Revocable attribute-based signature for blockchain-based healthcare system[J]. IEEE Access, 2020, 8: 127884−127896 doi: 10.1109/ACCESS.2020.3007691
    [14]
    Li Youhuizi, Chen Xu, Yin Yuyu, et al. SDABS: A flexible and efficient multi-authority hybrid attribute-based signature scheme in edge environment[J]. IEEE Transactions on Intelligent Transportation Systems, 2020, 22(3): 1892−1906
    [15]
    张应辉,贺江勇,郭瑞,等. 工业物联网中服务器辅助且可验证的属性基签名方案[J]. 计算机研究与发展,2020,57(10):2177−2187

    Zhang Yinghui, He Jiangyong, Guo Rui, et al. Server-aided and verifiable attribute-based signature for industrial Internet of things[J]. Journal of Computer Research and Development, 2020, 57(10): 2177−2187 (in Chinese)
    [16]
    Yang Xiaodong, Li Ting, Pei Xizhen, et al. Medical data sharing scheme based on attribute cryptosystem and blockchain technology[J]. IEEE Access, 2020, 8: 45468−45476 doi: 10.1109/ACCESS.2020.2976894
    [17]
    Cui H, Deng R H, Wang Guilin. An attribute-based framework for secure communications in vehicular ad hoc networks[J]. IEEE/ACM Transactions on Networking, 2019, 27(2): 721−733 doi: 10.1109/TNET.2019.2894625
    [18]
    Gu Ke, Wang Keming, Yang Lulu. Traceable attribute-based signature[J]. Journal of Information Security and Applications, 2019, 49: 102400

    Gu Ke,Wang Keming,Yang Lulu. Traceable attribute-based signature[J]. Journal of Information Security and Applications,2019,49:102400
    [19]
    Belguith S, Kaaniche N, Laurent M, et al. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds[J]. Journal of Parallel and Distributed Computing, 2020, 135: 1−20 doi: 10.1016/j.jpdc.2019.08.014
    [20]
    李继国,朱留富,刘成东,等. 标准模型下证明安全的可追踪属性基净化签名方案[J]. 计算机研究与发展,2021,58(10):2253−2264

    Li Jiguo, Zhu Liufu, Liu Chengdong, et al. Provably secure traceable attribute-based sanitizable signature scheme in the standard model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253−2264 (in Chinese)
    [21]
    Zhang Yinghui, Zheng Dong, Deng R H. Security and privacy in smart health: Efficient policy-hiding attribute-based access control[J]. IEEE Internet of Things Journal, 2018, 5(3): 2130−2145 doi: 10.1109/JIOT.2018.2825289
    [22]
    王悦,樊凯. 隐藏访问策略的高效CP-ABE方案[J]. 计算机研究与发展,2019,56(10):2151−2159

    Wang Yue, Fan Kai. Effective CP-ABE with hidden access policy[J]. Journal of Computer Research and Development, 2019, 56(10): 2151−2159 (in Chinese)
    [23]
    Han Dezhi, Pan Nannan, Li K C. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 19(1): 316−327
    [24]
    唐飞,凌国玮,单进勇. 基于国产密码算法SM9的可追踪属性签名方案[J]. 电子与信息学报,2022,44(10):3610−3617

    Tang Fei, Ling Guowei, Shan Jinyong. Traceable attribute signature scheme based on domestic cryptographic SM9 algorithm[J]. Journal of Electronics & Information Technology, 2022, 44(10): 3610−3617 (in Chinese)
    [25]
    朱留富,李继国,赖建昌,等. 基于商密SM9的属性基在线/离线签名方案[J]. 计算机研究与发展,2023,60(2):362−370

    Zhu Liufu, Li Jiguo, Lai Jianchang, et al. Attribute-based online/offline signature scheme based on SM9[J]. Journal of Computer Research and Development, 2023, 60(2): 362−370 (in Chinese)
    [26]
    Boneh D, Boyen X. Short signatures without random oracles[C]//Proc of Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2004: 56−73
    [27]
    De Caro A, Iovino V. jPBC: Java pairing based cryptography[C]//Proc of IEEE Symp on Computers and Communications. Piscataway, NJ: IEEE, 2011: 850−855
    [28]
    Rouselakis Y, Waters B. Practical constructions and new proof methods for large universe attribute-based encryption[C]//Proc of the 2013 ACM SIGSAC Conf on Computer & Communications Security. New York: ACM, 2013: 463−474
  • Related Articles

    [1]Wang Jingyi, Kan Haibin. Fine-Grained Policy-Hiding and Traceable Decentralized Access Control Scheme in mHealth[J]. Journal of Computer Research and Development, 2024, 61(6): 1525-1535. DOI: 10.7544/issn1000-1239.202330092
    [2]Tang Yongli, Li Ying, Zhao Zongqu, Li Xingyu, Wang Hanbo. Traceable Anonymous Single Sign on Scheme on Lattice[J]. Journal of Computer Research and Development, 2023, 60(6): 1417-1430. DOI: 10.7544/issn1000-1239.202111235
    [3]Hou Huiying, Lian Huanhuan, Zhao Yunlei. An Efficient and Traceable Anonymous VANET Communication Scheme for Autonomous Driving[J]. Journal of Computer Research and Development, 2022, 59(4): 894-906. DOI: 10.7544/issn1000-1239.20200915
    [4]Li Jiguo, Zhu Liufu, Liu Chengdong, Lu Yang, Han Jinguang, Wang Huaqun, Zhang Yichen. Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253-2264. DOI: 10.7544/issn1000-1239.2021.20210669
    [5]Luo Entao, Duan Guoyun, Zhou Lei, Zhu Xiaoyu. An Anonymous Agent Tracking Privacy Preserving Scheme in Mobile Healthcare System[J]. Journal of Computer Research and Development, 2020, 57(5): 1070-1079. DOI: 10.7544/issn1000-1239.2020.20190307
    [6]Gao Jiaxin, Sun Jiameng, Qin Jing. Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation[J]. Journal of Computer Research and Development, 2019, 56(10): 2160-2169. DOI: 10.7544/issn1000-1239.2019.20190323
    [7]Wang Yue, Fan Kai. Effective CP-ABE with Hidden Access Policy[J]. Journal of Computer Research and Development, 2019, 56(10): 2151-2159. DOI: 10.7544/issn1000-1239.2019.20190343
    [8]Zhang Kai, Ma Jianfeng, Zhang Junwei, Ying Zuobin, Zhang Tao, Liu Ximeng. Online/Offline Traceable Attribute-Based Encryption[J]. Journal of Computer Research and Development, 2018, 55(1): 216-224. DOI: 10.7544/issn1000-1239.2018.20160799
    [9]Chang Fen, Cui Jie, Wang Liangmin. A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network[J]. Journal of Computer Research and Development, 2017, 54(9): 2011-2020. DOI: 10.7544/issn1000-1239.2017.20160635
    [10]Wang Feng, Zhou Yousheng, Gu Lize, Yang Yixian. A Multi-Policies Threshold Signature Scheme with Group Verifiability[J]. Journal of Computer Research and Development, 2012, 49(3): 499-505.
  • Cited by

    Periodical cited type(18)

    1. 徐宁,李静秋,王岚君,刘安安. 时序特性引导下的谣言事件检测方法评测. 南京大学学报(自然科学). 2025(01): 71-82 .
    2. 崔蒙蒙,刘井平,阮彤,宋雨秋,杜渂. 基于双重多视角表示的目标级隐性情感分类. 计算机工程. 2024(01): 79-90 .
    3. 张乐怡,周怡洁,俞定国,闫燕勤. 媒介变迁下的谣言传播研究. 新媒体研究. 2024(14): 12-16 .
    4. 王世雄,吴泽政. 基于异质信息网络表征学习的微博虚假信息甄别研究. 情报杂志. 2024(12): 152-160 .
    5. 陈雄逸,许力,张欣欣,尤玮婧. 社交网络基于意见领袖的谣言抑制方案. 信息安全研究. 2023(01): 57-65 .
    6. 张欣欣 ,许力 ,徐振宇 . 基于网络模体的移动社会网络信息可控传播方法. 电子与信息学报. 2023(02): 635-643 .
    7. 杨晓晖,王卫宾. 基于门控图神经网络的谣言检测模型. 燕山大学学报. 2023(01): 73-81 .
    8. 孙书魁,范菁,李占稳,曲金帅,路佩东. 人工智能在新型冠状病毒肺炎中的研究综述. 计算机工程与应用. 2023(05): 28-39 .
    9. 陈卓敏,王莉,朱小飞,王子康. 基于对抗图增强对比学习的虚假新闻检测. 中文信息学报. 2023(06): 137-146 .
    10. 鲁贻锦,吴蕾. 基于大数据驱动技术的媒体风险感知模型研究. 佳木斯大学学报(自然科学版). 2023(06): 52-56 .
    11. 许云红,崔乐靖,朱南丽,郑娜娜. 社交媒体用户谣言传播行为的影响因素研究综述. 新媒体研究. 2023(24): 14-17+33 .
    12. 龙小农,靳旭鹏. 新冠疫情、信息疫情与政治疫情的互动关系及作用机制. 现代传播(中国传媒大学学报). 2022(02): 66-76 .
    13. 杨秀璋,刘建义,任天舒,宋籍文,武帅,姜婧怡,陈登建,周既松,李娜. 基于改进LDA-CNN-BiLSTM模型的社交媒体情感分析研究. 现代计算机. 2022(02): 29-36 .
    14. 张放,范琳琅. 公共危机中社交媒体辟谣信息采纳的关键要素探究——基于新冠疫情微博辟谣文本的计算分析. 新闻界. 2022(10): 75-85 .
    15. 朱梦蝶,付少雄,郑德俊,李杨. 文献视角下的社交媒体健康谣言研究:特征、传播与治理. 图书情报知识. 2022(05): 131-143 .
    16. 肖喜珠,杨闻远,高慧敏,高世奇,郭书恒,路思玲,聂欣政,任书漫,王一民,温馨. “后真相”时代的风险感知与反击:青年社交媒体用户信息行为研究. 新媒体研究. 2022(21): 40-46 .
    17. 徐建民,王恺霖,吴树芳. 基于改进D-S证据理论的微博不可信用户识别研究. 数据分析与知识发现. 2022(12): 99-112 .
    18. 周晖. 国内外基于社交媒体的社会情绪对比分析. 中华医学图书情报杂志. 2022(12): 65-69 .

    Other cited types(21)

Catalog

    Article views (45) PDF downloads (34) Cited by(39)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return