Citation: | Zhou Quan, Chen Minhui, Wei Kaijun, Zheng Yulong. Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden[J]. Journal of Computer Research and Development, 2025, 62(4): 1065-1074. DOI: 10.7544/issn1000-1239.202330744 |
Traceable attribute-based signature (TABS) inherits the merits of attribute-based signature and can trace the real identity of the signer through a trusted third party, avoiding the abuse of anonymity of attribute-based signature. At present, there are very few signature-policy attribute-based signature (SP-ABS) schemes that support traceability in one-to-many authentication scenario, and most of the existing schemes suffer from efficiency and security deficiencies, for example, the computational complexity of the verification phase is linearly related to the number of attributes, which is inefficient. Meanwhile, the fact that the policy is provided directly by the verifier to the signer can easily lead to policy privacy leakage. To solve the above problems, a traceable attribute-based signature scheme supporting policy hiding based on SM9 is proposed in this paper. The scheme uses a linear secret sharing scheme (LSSS) with attribute name and attribute value splitting to construct the access structure, supports partial hiding of the policies, and can protect the policy privacy of the verifier while protecting the signer’s identity privacy and attribute privacy. In the verification phase, the scheme only requires constant order bilinear pairing operations and exponential operations, which can achieve efficient fine-grained access control. Finally, the scheme is proved to be unforgeable under the random oracle model by the q-strong Diffie-Hellman (q-SDH) hard problem.
[1] |
Maji K, Prabhakaran M, Rosulek M. Attribute-based signatures[C]//Proc of the 11th Int Conf on Topics in Cryptology. Berlin: Springer, 2011: 376−392
|
[2] |
Escala A, Herranz J, Morillo P. Revocable attribute-based signatures with adaptive security in the standard model[C]//Proc of the 4th Int Conf on the Theory and Application of Cryptographic Techniques in Africa. Berlin: Springer, 2011: 224−241
|
[3] |
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//Proc of the 28th IEEE Symp on Security and Privacy (SP’07). Los Alamitos, CA: IEEE Computer Society, 2007: 321−334
|
[4] |
Su Jinshu, Cao Dan, Zhao Baokang, et al. ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of things[J]. Future Generation Computer Systems, 2014, 33: 11−18 doi: 10.1016/j.future.2013.10.016
|
[5] |
Wang Changji, Li Wentao. An efficient attribute-based signature scheme with claim-predicate mechanism[J]. International Journal of Grid and Utility Computing, 2013, 4(2/3): 151−159 doi: 10.1504/IJGUC.2013.056251
|
[6] |
Rao Y S, Dutta R. Bandwidth-efficient attribute-based key-insulated signatures with message recovery[J]. Information Sciences, 2016, 369: 648−673 doi: 10.1016/j.ins.2016.07.039
|
[7] |
国家密码管理局. GM/T 0044—2016 SM9标识密码算法[S]. 北京:中国标准出版社,2016
State Cryptography Administration. GM/T 0044—2016 Identity-based cryptographic algorithms SM9[S]. Beijing: Standard Press of China, 2016 (in Chinese)
|
[8] |
Cheung L, Newport C. Provably secure ciphertext policy ABE[C]//Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007: 456−465
|
[9] |
Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006: 89−98
|
[10] |
Goyal V, Jain A, Pandey O, et al. Bounded ciphertext policy attribute based encryption[C]//Proc of the 35th Int Colloquium on Automata, Languages, and Programming. Berlin: Springer, 2008: 579−591
|
[11] |
Zhang Yan, Feng Dengguo, Zhang Zhengfeng, et al. On the security of an efficient attribute-based signature[C]//Proc of Int Conf on Network and System Security. Berlin: Springer, 2013: 381−392
|
[12] |
Xiong Hu, Bao Yangyang, Nie Xuyun, et al. Server-aided attribute-based signature supporting expressive access structures for industrial Internet of things[J]. IEEE Transactions on Industrial Informatics, 2019, 16(2): 1013−1023
|
[13] |
Su Qianqian, Zhang Rui, Xue Rui, et al. Revocable attribute-based signature for blockchain-based healthcare system[J]. IEEE Access, 2020, 8: 127884−127896 doi: 10.1109/ACCESS.2020.3007691
|
[14] |
Li Youhuizi, Chen Xu, Yin Yuyu, et al. SDABS: A flexible and efficient multi-authority hybrid attribute-based signature scheme in edge environment[J]. IEEE Transactions on Intelligent Transportation Systems, 2020, 22(3): 1892−1906
|
[15] |
张应辉,贺江勇,郭瑞,等. 工业物联网中服务器辅助且可验证的属性基签名方案[J]. 计算机研究与发展,2020,57(10):2177−2187
Zhang Yinghui, He Jiangyong, Guo Rui, et al. Server-aided and verifiable attribute-based signature for industrial Internet of things[J]. Journal of Computer Research and Development, 2020, 57(10): 2177−2187 (in Chinese)
|
[16] |
Yang Xiaodong, Li Ting, Pei Xizhen, et al. Medical data sharing scheme based on attribute cryptosystem and blockchain technology[J]. IEEE Access, 2020, 8: 45468−45476 doi: 10.1109/ACCESS.2020.2976894
|
[17] |
Cui H, Deng R H, Wang Guilin. An attribute-based framework for secure communications in vehicular ad hoc networks[J]. IEEE/ACM Transactions on Networking, 2019, 27(2): 721−733 doi: 10.1109/TNET.2019.2894625
|
[18] |
Gu Ke, Wang Keming, Yang Lulu. Traceable attribute-based signature[J]. Journal of Information Security and Applications, 2019, 49: 102400
Gu Ke,Wang Keming,Yang Lulu. Traceable attribute-based signature[J]. Journal of Information Security and Applications,2019,49:102400
|
[19] |
Belguith S, Kaaniche N, Laurent M, et al. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds[J]. Journal of Parallel and Distributed Computing, 2020, 135: 1−20 doi: 10.1016/j.jpdc.2019.08.014
|
[20] |
李继国,朱留富,刘成东,等. 标准模型下证明安全的可追踪属性基净化签名方案[J]. 计算机研究与发展,2021,58(10):2253−2264
Li Jiguo, Zhu Liufu, Liu Chengdong, et al. Provably secure traceable attribute-based sanitizable signature scheme in the standard model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253−2264 (in Chinese)
|
[21] |
Zhang Yinghui, Zheng Dong, Deng R H. Security and privacy in smart health: Efficient policy-hiding attribute-based access control[J]. IEEE Internet of Things Journal, 2018, 5(3): 2130−2145 doi: 10.1109/JIOT.2018.2825289
|
[22] |
王悦,樊凯. 隐藏访问策略的高效CP-ABE方案[J]. 计算机研究与发展,2019,56(10):2151−2159
Wang Yue, Fan Kai. Effective CP-ABE with hidden access policy[J]. Journal of Computer Research and Development, 2019, 56(10): 2151−2159 (in Chinese)
|
[23] |
Han Dezhi, Pan Nannan, Li K C. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 19(1): 316−327
|
[24] |
唐飞,凌国玮,单进勇. 基于国产密码算法SM9的可追踪属性签名方案[J]. 电子与信息学报,2022,44(10):3610−3617
Tang Fei, Ling Guowei, Shan Jinyong. Traceable attribute signature scheme based on domestic cryptographic SM9 algorithm[J]. Journal of Electronics & Information Technology, 2022, 44(10): 3610−3617 (in Chinese)
|
[25] |
朱留富,李继国,赖建昌,等. 基于商密SM9的属性基在线/离线签名方案[J]. 计算机研究与发展,2023,60(2):362−370
Zhu Liufu, Li Jiguo, Lai Jianchang, et al. Attribute-based online/offline signature scheme based on SM9[J]. Journal of Computer Research and Development, 2023, 60(2): 362−370 (in Chinese)
|
[26] |
Boneh D, Boyen X. Short signatures without random oracles[C]//Proc of Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2004: 56−73
|
[27] |
De Caro A, Iovino V. jPBC: Java pairing based cryptography[C]//Proc of IEEE Symp on Computers and Communications. Piscataway, NJ: IEEE, 2011: 850−855
|
[28] |
Rouselakis Y, Waters B. Practical constructions and new proof methods for large universe attribute-based encryption[C]//Proc of the 2013 ACM SIGSAC Conf on Computer & Communications Security. New York: ACM, 2013: 463−474
|
[1] | Wang Jingyi, Kan Haibin. Fine-Grained Policy-Hiding and Traceable Decentralized Access Control Scheme in mHealth[J]. Journal of Computer Research and Development, 2024, 61(6): 1525-1535. DOI: 10.7544/issn1000-1239.202330092 |
[2] | Tang Yongli, Li Ying, Zhao Zongqu, Li Xingyu, Wang Hanbo. Traceable Anonymous Single Sign on Scheme on Lattice[J]. Journal of Computer Research and Development, 2023, 60(6): 1417-1430. DOI: 10.7544/issn1000-1239.202111235 |
[3] | Hou Huiying, Lian Huanhuan, Zhao Yunlei. An Efficient and Traceable Anonymous VANET Communication Scheme for Autonomous Driving[J]. Journal of Computer Research and Development, 2022, 59(4): 894-906. DOI: 10.7544/issn1000-1239.20200915 |
[4] | Li Jiguo, Zhu Liufu, Liu Chengdong, Lu Yang, Han Jinguang, Wang Huaqun, Zhang Yichen. Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253-2264. DOI: 10.7544/issn1000-1239.2021.20210669 |
[5] | Luo Entao, Duan Guoyun, Zhou Lei, Zhu Xiaoyu. An Anonymous Agent Tracking Privacy Preserving Scheme in Mobile Healthcare System[J]. Journal of Computer Research and Development, 2020, 57(5): 1070-1079. DOI: 10.7544/issn1000-1239.2020.20190307 |
[6] | Gao Jiaxin, Sun Jiameng, Qin Jing. Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation[J]. Journal of Computer Research and Development, 2019, 56(10): 2160-2169. DOI: 10.7544/issn1000-1239.2019.20190323 |
[7] | Wang Yue, Fan Kai. Effective CP-ABE with Hidden Access Policy[J]. Journal of Computer Research and Development, 2019, 56(10): 2151-2159. DOI: 10.7544/issn1000-1239.2019.20190343 |
[8] | Zhang Kai, Ma Jianfeng, Zhang Junwei, Ying Zuobin, Zhang Tao, Liu Ximeng. Online/Offline Traceable Attribute-Based Encryption[J]. Journal of Computer Research and Development, 2018, 55(1): 216-224. DOI: 10.7544/issn1000-1239.2018.20160799 |
[9] | Chang Fen, Cui Jie, Wang Liangmin. A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network[J]. Journal of Computer Research and Development, 2017, 54(9): 2011-2020. DOI: 10.7544/issn1000-1239.2017.20160635 |
[10] | Wang Feng, Zhou Yousheng, Gu Lize, Yang Yixian. A Multi-Policies Threshold Signature Scheme with Group Verifiability[J]. Journal of Computer Research and Development, 2012, 49(3): 499-505. |