Processing math: 100%
  • 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhu Liufu, Li Jiguo, Lu Yang, Zhang Yichen. Efficient and Forward-Secure Attribute-Based Sanitizable Signature Scheme[J]. Journal of Computer Research and Development, 2023, 60(12): 2737-2748. DOI: 10.7544/issn1000-1239.202220212
Citation: Zhu Liufu, Li Jiguo, Lu Yang, Zhang Yichen. Efficient and Forward-Secure Attribute-Based Sanitizable Signature Scheme[J]. Journal of Computer Research and Development, 2023, 60(12): 2737-2748. DOI: 10.7544/issn1000-1239.202220212

Efficient and Forward-Secure Attribute-Based Sanitizable Signature Scheme

Funds: This work was supported by the National Natural Science Foundation of China (62072104, 61972095, U21A20465, U1736112, 61972190) and the Natural Science Foundation of Fujian Province (2020J01159).
More Information
  • Author Bio:

    Zhu Liufu: born in 1995. Master candidate. His main research interest includes public key cryptography

    Li Jiguo: born in 1970. PhD, professor. Member of CCF. His main research interests include public key cryptography and cloud computing security

    Lu Yang: born in 1977. PhD, professor. His main research interests include information security and cryptography, and cloud computing security

    Zhang Yichen: born in 1971. PhD, associate professor. Her main research interests include public key cryptography and cloud computing security

  • Received Date: March 13, 2022
  • Revised Date: December 22, 2022
  • Available Online: May 03, 2023
  • In the attribute-based signature (ABS) scheme, the secret key of the signer is generated by attribute authority with different attributes, and the signature can be generated successfully only when the attributes meet the given signing policy. The verifier does not need to know the identity of the signer to determine whether the signature is valid. As a result, ABS has attracted wide attention due to its anonymity and fine-grained access control. In ABS scheme, once the key leakage occurs, the attacker can use the leaked key to generate a valid signature. The original message often contains some sensitive information. For example, in e-health or electronic finance scenario, personal privacy information is contained in personal medical records or transaction records. If the original message is not desensitized, sensitive personal information will be leaked. In order to solve the problems of key leakage and sensitive information leakage, an efficient and forward-secure attribute-based sanitizable signature (FABSS) scheme is proposed. The security of FABSS is reduced to the η-DHE (η-Diffie-Hellman exponent) assumption problem under the standard model. The proposed scheme not only protects signer privacy and supports fine-grained access control, but also has the ability to hide sensitive information and resist key leakage. In addition, the length of signature is constant, and only a constant number of pairing operations need to be calculated in the verification stage. Experimental analysis shows that the performance of the proposed scheme is efficient.

  • [1]
    Sahai A, Waters B. Fuzzy identity-based encryption[C] //Proc of the 24th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2005: 457−473
    [2]
    Goyal V, Pandey O, Saha A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C] //Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006: 89–98
    [3]
    Li Jiguo, Yao Wei, Zhang Yichen, et al. Flexible and fine-grained attribute-based data storage in cloud computing[J]. IEEE Transactions on Services Computing, 2017, 10(5): 785−796 doi: 10.1109/TSC.2016.2520932
    [4]
    Chen Ningyu, Li Jiguo, Zhang Yichen, et al. Efficient CP-ABE scheme with shared decryption in cloud storage[J]. IEEE Transactions on Computers, 2022, 71(1): 175−184 doi: 10.1109/TC.2020.3043950
    [5]
    Li Jiguo, Chen Ningyu, Zhang Yichen. Extended file hierarchy access control scheme with attribute based encryption in cloud computing[J]. IEEE Transactions on Emerging Topics in Computing, 2021, 9(2): 983−993 doi: 10.1109/TETC.2019.2904637
    [6]
    Li Jiguo, Wang Yao, Zhang Yichen, et al. Full verifiability for outsourced decryption in attribute based encryption[J]. IEEE Transactions on Services Computing, 2020, 13(3): 478−487 doi: 10.1109/TSC.2017.2710190
    [7]
    Li Jiguo, Yao Wei, Han Jinguang, et al. User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage[J]. IEEE Systems Journal, 2018, 12(2): 1767−1777 doi: 10.1109/JSYST.2017.2667679
    [8]
    Li Jiguo, Yu Qihong, Zhang Yichen. Hierarchical attribute based encryption with continuous leakage-resilience[J]. Information Sciences, 2019, 484: 113−134 doi: 10.1016/j.ins.2019.01.052
    [9]
    Li Jiguo, Zhang Yichen, Ning Jianting, et al. Attribute based encryption with privacy protection and accountability for cloudIoT[J]. IEEE Transactions on Cloud Computing, 2022, 10(2): 762−773
    [10]
    Lin Suqing, Zhang Rui, Ma Hui, et al. Revisiting attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics & Security, 2017, 10(10): 2119−2130
    [11]
    Liu Ximeng, Ma Jianfeng, Xiong Jinbo, et al. Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data[J]. International Journal of Network Security, 2014, 16(6): 437−443
    [12]
    Chen Yu, Li Jiguo, Liu Chengdong, et al. Efficient attribute-based server-aided verification signature [J/OL]. IEEE Transactions on Services Computing, 2022, 15(6): 3224-3232
    [13]
    Li Jiguo, Chen Yu, Han Jinguang, et al. Decentralized attribute-based server-aid signature in the Internet of things[J]. IEEE Internet of Things Journal, 2021, 9(6): 4573−4583
    [14]
    Okamoto T, Takashima K. Decentralized attribute-based signatures [C] //Proc of the 16th Int Conf on Practice and Theory in Public Key Cryptography. Berlin: Springer, 2013: 125−142
    [15]
    Sreenivasa R Y, Dutta R. Efficient attribute-based signature and signcryption realizing expressive access structures[J]. International Journal of Information Security, 2016, 15(1): 81−109 doi: 10.1007/s10207-015-0289-6
    [16]
    Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [C] //Proc of the 28th IEEE Symp on Security and Privacy (SP '07). Los Alamitos, CA: IEEE Computer Society, 2007: 321−334
    [17]
    Maji K, Prabhakaran M, Rosulek M. Attribute-based signatures[C] //Proc of the 11th Int Conf on Topics in Cryptology. Berlin: Springer, 2011: 376−392
    [18]
    Okamoto T, Takashima K. Efficient attribute-based signatures for non-monotone predicates in the standard model[C] //Proc of the 14th Int Conf on. Practice and Theory in Public Key Cryptography. Berlin: Springer, 2011: 125−142
    [19]
    Gagn, Martin, Narayan S, et al. Short pairing-efficient threshold attribute-based signature[C] //Proc of the 5th Int Conf on Pairing-Based Cryptography. Berlin: Springer , 2012: 295−313
    [20]
    Anada H, Arita S, Sakurai K. Attribute-based signatures without pairings via the fiat-shamir paradigm[C] //Proc of the 9th ACM Workshop on ASIA Public key Cryptography. New York: ACM 2014: 49−58
    [21]
    Wei Jianghong, Liu Wenfen, Hu Xuexian. Forward-secure threshold attribute-based signature scheme[J]. The Computer Journal, 2015, 58(10): 2492−2506 doi: 10.1093/comjnl/bxu095
    [22]
    Rao Y S. Signature-policy attribute-based key-insulated signature[J]. IET Information Security, 2017, 11(1): 23−33 doi: 10.1049/iet-ifs.2015.0355
    [23]
    Ateniese G, Chou D H, De Medeiros B, et al. Sanitizable signatures [C] //Proc of the 10th European Symp on Research in Computer Security. Berlin: Springer, 2005: 159−177
    [24]
    Agrawal S, Kumar S, Shareef A, et al. Sanitizable signatures with strong transparency in the standard model[C] //Proc of the 5th Int Conf on Information Security and Cryptology. Berlin: Springer, 2009: 93−107
    [25]
    Pöhls Henrich C, Samelin K, Posegga J. Sanitizable signatures in XML signature—Performance, mixing properties, and revisiting the property of transparency[C] //Proc of the 9th Int Conf on Applied Cryptography and Network Security. Berlin: Springer, 2011: 166−182
    [26]
    Beck M T, Camenisch J, Derler D, et al. Practical strongly invisible and strongly accountable sanitizable signatures[C] //Proc of the 22nd Australasian Conf on Information Security and Privacy (ACISP 2017). Berlin: Springer, 2017: 437−452
    [27]
    刘西蒙,马建峰,熊金波,等. 基于属性的可净化签名方案[J]. 通信学报,2013,34(S1):148−155

    Liu Ximeng, Ma Jianfeng, Xiong Jinbo, et al. Attribute based sanitizable signature scheme[J]. Journal on Communications, 2013, 34(S1): 148−155 (in Chinese)
    [28]
    莫若,马建峰,刘西蒙,等. 一种支持树形访问结构的属性基可净化签名方案[J]. 电子学报,2017,45(11):2715−2720 doi: 10.3969/j.issn.0372-2112.2017.11.019

    Mo Ruo, Ma Jianfeng, Liu Ximeng, et al. An attribute-based sanitizable signature supporting dendritic access structure[J]. Acta Electronica Sinica, 2017, 45(11): 2715−2720 (in Chinese) doi: 10.3969/j.issn.0372-2112.2017.11.019
    [29]
    Mo Ruo, Ma Jianfeng, Liu Ximeng, et al. FABSS: Attribute-based sanitizable signature for flexible access structure[C] //Proc of the 19th Int Conf on Information and Communications Security. Berlin: Springer, 2018: 39−50
    [30]
    Samelin K, Slamanig D. Policy-based sanitizable signatures [C] //Proc of the Cryptographers' Track at the RSA Conf . Berlin: Springer, 2020: 538−563
    [31]
    李继国,朱留富,刘成东,等. 标准模型下证明安全的可追踪属性基净化签名方案[J]. 计算机研究与发展,2021,58(10):2253−2264 doi: 10.7544/issn1000-1239.2021.20210669

    Li Jiguo, Zhu Liufu, Liu Chengdong, et al. Provably secure traceable attribute-based sanitizable signature scheme in the standard model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253−2264 (in Chinese) doi: 10.7544/issn1000-1239.2021.20210669
    [32]
    Canetti R, Halevi S, Katz J. A forward-secure public-key encryption scheme[J]. Journal of Cryptology, 2007, 20(3): 265−294 doi: 10.1007/s00145-006-0442-5
    [33]
    Zhang Jixin, Chen Jiageng, Meng Weizhi. Efficient attribute-based signature for monotone predicates[C] //Proc of the Int Conf on Provable Security (ProvSec 2021). Berlin: Springer, 2021: 346−362
  • Related Articles

    [1]Lin Liansheng, Zheng Huanqin, Su Shen, Lei Kai, Chen Xiaofeng, Tian Zhihong. An On-Chain Mechanism Against DeFi Price Manipulation Attacks[J]. Journal of Computer Research and Development, 2025, 62(2): 443-457. DOI: 10.7544/issn1000-1239.202330291
    [2]Song Shuwei, Ni Xiaoze, Chen Ting. Gas Optimization for Smart Contracts: A Survey[J]. Journal of Computer Research and Development, 2023, 60(2): 311-325. DOI: 10.7544/issn1000-1239.202220887
    [3]Ying Chenhao, Xia Fuyuan, Li Jie, Si Xueming, Luo Yuan. Incentive Mechanism Based on Truth Estimation of Private Data for Blockchain-Based Mobile Crowdsensing[J]. Journal of Computer Research and Development, 2022, 59(10): 2212-2232. DOI: 10.7544/issn1000-1239.20220493
    [4]Feng Jingyu, Yang Jinwen, Zhang Ruitong, Zhang Wenbo. A Spectrum Sharing Incentive Scheme Against Location Privacy Leakage in IoT Networks[J]. Journal of Computer Research and Development, 2020, 57(10): 2209-2220. DOI: 10.7544/issn1000-1239.2020.20200453
    [5]Hai Mo, Zhu Jianming. A Propagation Mechanism Combining an Optimal Propagation Path and Incentive in Blockchain Networks[J]. Journal of Computer Research and Development, 2019, 56(6): 1205-1218. DOI: 10.7544/issn1000-1239.2019.20180419
    [6]He Yunhua, Li Mengru, Li Hong, Sun Limin, Xiao Ke, Yang Chao. A Blockchain Based Incentive Mechanism for Crowdsensing Applications[J]. Journal of Computer Research and Development, 2019, 56(3): 544-554. DOI: 10.7544/issn1000-1239.2019.20170670
    [7]He Haiwu, Yan An, Chen Zehua. Survey of Smart Contract Technology and Application Based on Blockchain[J]. Journal of Computer Research and Development, 2018, 55(11): 2452-2466. DOI: 10.7544/issn1000-1239.2018.20170658
    [8]Xiong Jinbo, Ma Rong, Niu Ben, Guo Yunchuan, Lin Li. Privacy Protection Incentive Mechanism Based on User-Union Matching in Mobile Crowdsensing[J]. Journal of Computer Research and Development, 2018, 55(7): 1359-1370. DOI: 10.7544/issn1000-1239.2018.20180080
    [9]Wang Bo, Huang Chuanhe, Yang Wenzhong, Dan Feng, and Xu Liya. An Incentive-Cooperative Forwarding Model Based on Punishment Mechanism in Wireless Ad Hoc Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 398-406.
    [10]Yue Guangxue, Li Renfa, Chen Zhi, Zhou Xu. Analysis of Free-riding Behaviors and Modeling Restrain Mechanisms for Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 382-397.
  • Cited by

    Periodical cited type(2)

    1. 李硕,王馨爽. 多场景融合的码号数据分发架构及关键技术研究. 数据通信. 2024(06): 1-3+11 .
    2. 俞惠芳,李磊. 基于椭圆曲线签密的跨链医疗数据共享方案. 通信学报. 2024(12): 57-66 .

    Other cited types(0)

Catalog

    Article views (177) PDF downloads (109) Cited by(2)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return