• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Jiguo, Zhu Liufu, Liu Chengdong, Lu Yang, Han Jinguang, Wang Huaqun, Zhang Yichen. Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253-2264. DOI: 10.7544/issn1000-1239.2021.20210669
Citation: Li Jiguo, Zhu Liufu, Liu Chengdong, Lu Yang, Han Jinguang, Wang Huaqun, Zhang Yichen. Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253-2264. DOI: 10.7544/issn1000-1239.2021.20210669

Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model

Funds: This work was supported by the National Natural Science Foundation of China (62072104, 61972095, U1736112, 61972190, 61941116, 61772009) and the Natural Science Foundation of the Fujian Province of China (2020J01159).
More Information
  • Published Date: September 30, 2021
  • Since the concept of Attribute-Based Signature(ABS) was proposed, it has attracted wide attention due to its anonymity. ABS can hide the identity of signers to support anonymity, but anonymity may enable malicious signers to abuse signatures if the signatures are not traceable. At the same time, in specific application scenarios, such as e-medical treatment or e-commerce, some personal data(e.g. medical records, trade-transfer details, etc.) should be protected to prevent the leakage of private information. In order to hide sensitive information in data transmission and prevent malicious signers from abusing signatures, a traceable attribute-based sanitizable signature scheme is proposed. The security of the scheme is reduced to the Computational Diffie-Hellman(CDH) hard problem in the standard model. The scheme not only solves the problem of sensitive information hiding, guarantees the privacy of the signer, but also prevents the signer from abusing the signature.
  • Related Articles

    [1]Deng Xiangtian, Qian Haifeng. Flexible Fine-Grained Authorization Public Key Encryption with Equality Test Under Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2222-2237. DOI: 10.7544/issn1000-1239.2021.20210596
    [2]Wu Liqiang, Yang Xiaoyuan, Zhang Minqing. Identity-Based Threshold Decryption Scheme from Lattices under the Standard Model[J]. Journal of Computer Research and Development, 2018, 55(10): 2164-2173. DOI: 10.7544/issn1000-1239.2018.20180446
    [3]Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
    [4]Zhang Minqing, Du Weidong, Yang Xiaoyuan, HanYiliang. A Fully Secure KP-ABE Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2015, 52(8): 1893-1901. DOI: 10.7544/issn1000-1239.2015.20140605
    [5]Lu Yang and Li Jiguo. Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1497-1505.
    [6]Ge Lirong, Yu Jia, Cheng Xiangguo, Hao Rong, Zhao Huiyan, Li Meng. Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model[J]. Journal of Computer Research and Development, 2014, 51(5): 1081-1088.
    [7]Wang Zhiwei and Zhang Wei. ID Based Signature Scheme from Strong RSA Assumption in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(2): 302-306.
    [8]Pan Jiaxin and Wang Libin. A Modular Approach Towards Design and Analysis of Authenticated Key Exchange Protocol Based on Extended Canetti-Krawczyk Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1390-1399.
    [9]Wu Qing, Zhang Leyou, Hu Yupu. A New Construction of Short Hierarchical Identity-Based Signature in the Standard Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1357-1362.
    [10]Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi. Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Computer Research and Development, 2010, 47(9): 1604-1610.
  • Cited by

    Periodical cited type(6)

    1. 周权,陈民辉,卫凯俊,郑玉龙. 基于SM9的支持策略隐藏的可追踪属性签名. 计算机研究与发展. 2025(04): 1065-1074 . 本站查看
    2. 茅磊. 标准模型下同态聚合签名方案在车联网中的应用研究. 无线互联科技. 2024(09): 120-125 .
    3. 茅磊. 标准模型下同态签名方案的研究. 电脑知识与技术. 2024(21): 86-88 .
    4. 黄振杰,林志伟. 支持一般电路的高效安全基于属性签名. 计算机研究与发展. 2023(02): 351-361 . 本站查看
    5. 朱留富,李继国,赖建昌,黄欣沂,张亦辰. 基于商密SM9的属性基在线/离线签名方案. 计算机研究与发展. 2023(02): 362-370 . 本站查看
    6. 李继国,朱留富,沈剑,陆阳,张亦辰. 具有强指定验证者的属性基可净化签名方案. 计算机学报. 2023(09): 1806-1819 .

    Other cited types(4)

Catalog

    Article views (639) PDF downloads (247) Cited by(10)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return