• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Huang Zhenjie, Lin Zhiwei. Efficient and Secure Attribute-Based Signatures for General Circuits[J]. Journal of Computer Research and Development, 2023, 60(2): 351-361. DOI: 10.7544/issn1000-1239.202110920
Citation: Huang Zhenjie, Lin Zhiwei. Efficient and Secure Attribute-Based Signatures for General Circuits[J]. Journal of Computer Research and Development, 2023, 60(2): 351-361. DOI: 10.7544/issn1000-1239.202110920

Efficient and Secure Attribute-Based Signatures for General Circuits

Funds: This work was supported by the Natural Science Foundation of Fujian Province (2019J01750, 2019J01752, 2020J01814).
More Information
  • Received Date: September 08, 2021
  • Revised Date: April 18, 2022
  • Available Online: February 10, 2023
  • Attribute-based signature is an important cryptographic primitive and has attracted the attention of many scholars. Because of its good properties, attribute-based signature has found significant applications in many fields, such as message delivery, anonymous authentication, leaking secrets, trust negotiations, private access control, anonymous credentials, etc. To improve the security, expressiveness, and efficiency of attribute-based signature, an efficient and secure attribute-based signature scheme with perfect privacy for general circuits is proposed by using multi-linear mapping. By introducing the concept of node weight and adopting the "top-down" recursive, the computation cost of signature generation is reduced. The sizes of the keys of the gate nodes are reduced by using the symmetry of the left and right child nodes. Compared with the previous scheme, the proposed scheme improves the unforgeability from "existential unforgeable under selective message and selective attribute attack" to "existential unforgeable under adaptive chosen message but selective attribute attack." The proposed scheme extends the access structure from special circuits to general circuits, which can support arbitrary access structures and achieve arbitrary access control granularity. The proposed scheme keeps the signature as only one group element, shortens the sizes of the master public key, master private key, and signing key markedly, and reduces the computation overheads of signing key generation, signature generation, and signature verification significantly. The analysis shows that the proposed scheme has obvious advantages in performance and efficiency and is practical.

  • [1]
    Maji H, Prabhakaran M, Rosulek M. Attribute-based signatures[G] //LNCS 6558: Proc of the Cryptographers’ Track at the RSA Conf 2011. Berlin: Springer, 2011: 376−392
    [2]
    Shahandashti S, Safavi-naini R. Threshold attribute-based signatures and their application to anonymous credential systems[G] //LNCS 5580: Proc of the 2nd Int Conf on Cryptology in Africa. Berlin: Springer, 2009: 198−216
    [3]
    Li Jin, Au M, Susilo W, et al. Attribute-based signature and its applications[C] //Proc of the 5th Int Symp on Information, Computer and Communications Security (ASIACCS 2010). New York: ACM, 2010: 60−69
    [4]
    Herranz J, Laguillaumie F, Libert B, et al. Short attribute-based signatures for threshold predicates[G] //LNCS 7178: Proc of the Cryptographers’ Track at the RSA Conf 2012. Berlin: Springer, 2012: 51−67
    [5]
    Gagne M, Narayan S, Safavi-naini R. Short pairing-efficient threshold attribute-based signature[G] //LNCS 7708: Proc of the 5th Int Conf on Pairing-Based Cryptography. Berlin: Springer, 2012: 295−313
    [6]
    Gu Ke, Jia Weijia, Wang Guojun, et al. Efficient and secure attribute-based signature for monotone predicates[J]. Acta Informatica, 2017, 54(5): 521−541 doi: 10.1007/s00236-016-0270-5
    [7]
    Gu Ke, Wang Keming, Yang Lulu. Traceable attribute-based signature[J]. Journal of Information Security and Applications, 2019, 49: 1−13
    [8]
    Okamoto T, Takashima K. Efficient attribute-based signatures for non-monotone predicates in the standard model[G] //LNCS 6571: Proc of the 14th Int Conf on Practice and Theory in Public Key Cryptography. Berlin: Springer, 2011: 35−52
    [9]
    Okamoto T, Takashima K. Efficient attribute-based signatures for non-monotone predicates in the standard model[J]. IEEE Transactions on Cloud Computing, 2014, 8(3): 35−52
    [10]
    Tang Fei, Li Hongda, Liang Bei. Attribute-based signatures for circuits from multilinear maps[G] //LNCS 8783: Proc of the 17th Int Conf on Information Security. Berlin: Springer, 2014: 54−71
    [11]
    Sakai Y, Attrapadung N, Hanaoka G. Attribute-based signatures for circuits from bilinear map[G] //LNCS 9614: Proc of the 19th IACR Int Conf on Practice and Theory in Public-Key Cryptography. Berlin: Springer, 2016: 283−300
    [12]
    Kaafarani A, Katsumata S. Attribute-based signatures for unbounded circuits in the ROM and efficient instantiations from lattices[G] //LNCS 10770: Proc of the 21st IACR Int Conf on Practice and Theory of Public-Key Cryptography. Berlin: Springer, 2018: 89−119
    [13]
    Zhang Yanhua, Liu Ximeng, Hu Yupu, et al. Attribute-based signatures for inner-product predicate from lattices[G] //LNCS 11982: Proc of the 11th Int Symp on Cyberspace Safety and Security. Berlin: Springer, 2019: 173−185
    [14]
    Datta P, Okamoto T, Takashima K. Efficient attribute-based signatures for unbounded arithmetic branching programs[J]. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2021, E104. A(1): 25−57
    [15]
    Okamoto T, Takashima K. Decentralized attribute-based encryption and signatures[J]. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2020, E103. A(1): 41−73
    [16]
    Chen Xiaofeng, Li Jin, Huang Xinyi, et al. Secure outsourced attribute-based signatures[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(12): 3285−3294 doi: 10.1109/TPDS.2013.2295809
    [17]
    Mo Ruo, Ma Jianfeng, Liu Ximeng, et al. EOABS: Expressive outsourced attribute-based signature[J]. Peer-to-Peer Networking and Applications, 2018, 11(5): 979−988 doi: 10.1007/s12083-017-0626-9
    [18]
    Sun Jiameng, Su Ye, Qin Jing, et al. Outsourced decentralized multi-authority attribute based signature and its application in IoT[J]. IEEE Transactions on Cloud Computing, 2021, 9(3): 1195−1209 doi: 10.1109/TCC.2019.2902380
    [19]
    Huang Zhenjie, Lin Zhiwei, Chen Qunshan, et al. Outsourced attribute-based signatures with perfect privacy for circuits in cloud computing[J]. Concurrency and Computation: Practice and Experience, 2021, 30(10): e6173
    [20]
    Ren Yanli, Jiang Tiejin. Verifiable outsourced attribute-based signature scheme[J]. Multimedia Tools and Applications, 2018, 77(14): 18105−18115 doi: 10.1007/s11042-017-4539-7
    [21]
    Cui Hui, Deng R, Liu J, et al. Server-aided attribute-based signature with revocation for resource-constrained industrial-Internet-of-things devices[J]. IEEE Transactions on Industrial Informatics, 2018, 14(8): 3724−3732 doi: 10.1109/TII.2018.2813304
    [22]
    Xiong Hu, Bao Yangyang, Nie Xuyun, et al. Server-aided attribute-based signature supporting expressive access structures for industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2020, 16(2): 1013−1023 doi: 10.1109/TII.2019.2921516
    [23]
    Wang Zhiwei, Xie Ruirui, Wang Shaohui. Attribute-based server-aided verification signature[J]. Applied Mathematics & Information Sciences, 2014, 8(6): 3183−3190
    [24]
    陈少真,王文强,彭书娟. 高效的基于属性的环签名方案[J]. 计算机研究与发展,2010,47(12):2075−2082

    Chen Shaozhen, Wang Wenqiang, Peng Shujuan. Efficient attribute-based ring signature schemes[J]. Journal of Computer Research and Development, 2010, 47(12): 2075−2082 (in Chinese)
    [25]
    Sun Changxia, Liu Yi, Zeng Xia, et al. Provable secure attribute-based proxy signature[J]. Journal of Intelligent & Fuzzy Systems, 2020, 38(1): 337−343
    [26]
    Song Yun, Li Zhihui, Li Yongming, et al. Attribute-based signcryption scheme based on linear codes[J]. Information Sciences, 2017, 417: 301–309
    [27]
    李继国,朱留富,刘成东,等. 标准模型下证明安全的可追踪属性基净化签名方案[J]. 计算机研究与发展,2021,58(10):2253−2264

    Li Jiguo, Zhu Liufu, Liu Chengdong, et al. Provably secure traceable attribute-based sanitizable signature scheme in the standard model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253−2264 (in Chinese)
  • Related Articles

    [1]Chen Ming. A Composable Authentication Key Exchange Scheme with Post-Quantum Forward Secrecy[J]. Journal of Computer Research and Development, 2020, 57(10): 2158-2176. DOI: 10.7544/issn1000-1239.2020.20200472
    [2]Qin Xiongjun, Zhang Jiacheng, Lu Youyou, Shu Jiwu. A Key-Value Database Optimization Method Based on Raw Flash Device[J]. Journal of Computer Research and Development, 2017, 54(6): 1326-1336. DOI: 10.7544/issn1000-1239.2017.20170092
    [3]Zhang Minqing, Du Weidong, Yang Xiaoyuan, HanYiliang. A Fully Secure KP-ABE Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2015, 52(8): 1893-1901. DOI: 10.7544/issn1000-1239.2015.20140605
    [4]Ke Changbo, Huang Zhiqiu. Privacy Requirement Description and Checking Method in Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(4): 879-888. DOI: 10.7544/issn1000-1239.2015.20131906
    [5]Wu Yinghong, Huang Hao, Zeng Qingkai. Description of Service Oriented Access Control Policy Refinement[J]. Journal of Computer Research and Development, 2014, 51(11): 2470-2482. DOI: 10.7544/issn1000-1239.2014.20130973
    [6]Wang Lina, Ren Zhengwei, Dong Yongfeng, Yu Rongwei, Deng Ruyi. A Management Approach to Key-Used Times Based on Trusted Platform Module in Cloud Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1628-1636.
    [7]Sun Yu, Han Qingtong, and Liu Jianwei. Design of Key Exchange Protocol Based on Short Group Signature[J]. Journal of Computer Research and Development, 2012, 49(12): 2619-2622.
    [8]Wang Feng, Zhou Yousheng, Gu Lize, Yang Yixian. A Multi-Policies Threshold Signature Scheme with Group Verifiability[J]. Journal of Computer Research and Development, 2012, 49(3): 499-505.
    [9]Yu Jia, Kong Fanyu, Hao Rong, Li Daxing. A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2010, 47(4): 605-612.
    [10]Li Xiaofeng, Feng Dengguo, He Yongzhong. Research on Preprocessing Policies in XACML Admin[J]. Journal of Computer Research and Development, 2007, 44(5): 729-736.
  • Cited by

    Periodical cited type(1)

    1. 李明祥,王洪涛. 基于属性的全同态签名方案. 武汉大学学报(理学版). 2024(06): 733-742 .

    Other cited types(1)

Catalog

    Article views (130) PDF downloads (68) Cited by(2)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return