• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhou Quan, Chen Minhui, Wei Kaijun, Zheng Yulong. Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330744
Citation: Zhou Quan, Chen Minhui, Wei Kaijun, Zheng Yulong. Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330744

Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden

Funds: This work was supported by the National Key Research and Development Program of China (2021YFA1000600).
More Information
  • Author Bio:

    Zhou Quan: born in 1971. PhD, associate professor. His main research interests include information security and cloud computing

    Chen Minhui: born in 1998. Master candidate. His main research interests include attribute encryption and access control

    Wei Kaijun: born in 1999. Master candidate. His main research interests include access control and information security

    Zheng Yulong: born in 2000. Master candidate. His main research interests include cryptography and information security

  • Received Date: September 11, 2023
  • Revised Date: October 10, 2024
  • Accepted Date: October 15, 2024
  • Available Online: October 21, 2024
  • Traceable attribute-based signature (TABS) inherits the merits of attribute-based signature and can trace the real identity of the signer through a trusted third party, avoiding the abuse of anonymity of attribute-based signature. At present, there are very few signature-policy attribute-based signature (SP-ABS) schemes that support traceability in one-to-many authentication scenario, and most of the existing schemes suffer from efficiency and security deficiencies, for example, the computational complexity of the verification phase is linearly related to the number of attributes, which is inefficient. Meanwhile, the fact that the policy is provided directly by the verifier to the signer can easily lead to policy privacy leakage. To solve the above problems, a traceable attribute-based signature scheme supporting policy hiding based on SM9 is proposed in this paper. The scheme uses a linear secret sharing scheme (LSSS) with attribute name and attribute value splitting to construct the access structure, supports partial hiding of the policies, and can protect the policy privacy of the verifier while protecting the signer’s identity privacy and attribute privacy. In the verification phase, the scheme only requires constant order bilinear pairing operations and exponential operations, which can achieve efficient fine-grained access control. Finally, the scheme is proved to be unforgeable under the random oracle model by the q-strong Diffie-Hellman (q-SDH) hard problem.

  • [1]
    Maji K, Prabhakaran M, Rosulek M. Attribute-based signatures[C]//Proc of the 11th Int Conf on Topics in Cryptology. Berlin: Springer, 2011: 376−392
    [2]
    Escala A, Herranz J, Morillo P. Revocable attribute-based signatures with adaptive security in the standard model[C]//Proc of the 4th Int Conf on the Theory and Application of Cryptographic Techniques in Africa. Berlin: Springer, 2011: 224−241
    [3]
    Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//Proc of the 28th IEEE Symp on Security and Privacy (SP’07). Los Alamitos, CA: IEEE Computer Society, 2007: 321−334
    [4]
    Su Jinshu, Cao Dan, Zhao Baokang, et al. ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of things[J]. Future Generation Computer Systems, 2014, 33: 11−18 doi: 10.1016/j.future.2013.10.016
    [5]
    Wang Changji, Li Wentao. An efficient attribute-based signature scheme with claim-predicate mechanism[J]. International Journal of Grid and Utility Computing, 2013, 4(2/3): 151−159 doi: 10.1504/IJGUC.2013.056251
    [6]
    Rao Y S, Dutta R. Bandwidth-efficient attribute-based key-insulated signatures with message recovery[J]. Information Sciences, 2016, 369: 648−673 doi: 10.1016/j.ins.2016.07.039
    [7]
    国家密码管理局. GM/T 0044—2016 SM9标识密码算法[S]. 北京:中国标准出版社,2016

    State Cryptography Administration. GM/T 0044—2016 Identity-based cryptographic algorithms SM9[S]. Beijing: Standard Press of China, 2016 (in Chinese)
    [8]
    Cheung L, Newport C. Provably secure ciphertext policy ABE[C]//Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007: 456−465
    [9]
    Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006: 89−98
    [10]
    Goyal V, Jain A, Pandey O, et al. Bounded ciphertext policy attribute based encryption[C]//Proc of the 35th Int Colloquium on Automata, Languages, and Programming. Berlin: Springer, 2008: 579−591
    [11]
    Zhang Yan, Feng Dengguo, Zhang Zhengfeng, et al. On the security of an efficient attribute-based signature[C]//Proc of Int Conf on Network and System Security. Berlin: Springer, 2013: 381−392
    [12]
    Xiong Hu, Bao Yangyang, Nie Xuyun, et al. Server-aided attribute-based signature supporting expressive access structures for industrial Internet of things[J]. IEEE Transactions on Industrial Informatics, 2019, 16(2): 1013−1023
    [13]
    Su Qianqian, Zhang Rui, Xue Rui, et al. Revocable attribute-based signature for blockchain-based healthcare system[J]. IEEE Access, 2020, 8: 127884−127896 doi: 10.1109/ACCESS.2020.3007691
    [14]
    Li Youhuizi, Chen Xu, Yin Yuyu, et al. SDABS: A flexible and efficient multi-authority hybrid attribute-based signature scheme in edge environment[J]. IEEE Transactions on Intelligent Transportation Systems, 2020, 22(3): 1892−1906
    [15]
    张应辉,贺江勇,郭瑞,等. 工业物联网中服务器辅助且可验证的属性基签名方案[J]. 计算机研究与发展,2020,57(10):2177−2187

    Zhang Yinghui, He Jiangyong, Guo Rui, et al. Server-aided and verifiable attribute-based signature for industrial Internet of things[J]. Journal of Computer Research and Development, 2020, 57(10): 2177−2187 (in Chinese)
    [16]
    Yang Xiaodong, Li Ting, Pei Xizhen, et al. Medical data sharing scheme based on attribute cryptosystem and blockchain technology[J]. IEEE Access, 2020, 8: 45468−45476 doi: 10.1109/ACCESS.2020.2976894
    [17]
    Cui H, Deng R H, Wang Guilin. An attribute-based framework for secure communications in vehicular ad hoc networks[J]. IEEE/ACM Transactions on Networking, 2019, 27(2): 721−733 doi: 10.1109/TNET.2019.2894625
    [18]
    Gu Ke, Wang Keming, Yang Lulu. Traceable attribute-based signature[J]. Journal of Information Security and Applications, 2019, 49: 102400

    Gu Ke,Wang Keming,Yang Lulu. Traceable attribute-based signature[J]. Journal of Information Security and Applications,2019,49:102400
    [19]
    Belguith S, Kaaniche N, Laurent M, et al. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds[J]. Journal of Parallel and Distributed Computing, 2020, 135: 1−20 doi: 10.1016/j.jpdc.2019.08.014
    [20]
    李继国,朱留富,刘成东,等. 标准模型下证明安全的可追踪属性基净化签名方案[J]. 计算机研究与发展,2021,58(10):2253−2264

    Li Jiguo, Zhu Liufu, Liu Chengdong, et al. Provably secure traceable attribute-based sanitizable signature scheme in the standard model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253−2264 (in Chinese)
    [21]
    Zhang Yinghui, Zheng Dong, Deng R H. Security and privacy in smart health: Efficient policy-hiding attribute-based access control[J]. IEEE Internet of Things Journal, 2018, 5(3): 2130−2145 doi: 10.1109/JIOT.2018.2825289
    [22]
    王悦,樊凯. 隐藏访问策略的高效CP-ABE方案[J]. 计算机研究与发展,2019,56(10):2151−2159

    Wang Yue, Fan Kai. Effective CP-ABE with hidden access policy[J]. Journal of Computer Research and Development, 2019, 56(10): 2151−2159 (in Chinese)
    [23]
    Han Dezhi, Pan Nannan, Li K C. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 19(1): 316−327
    [24]
    唐飞,凌国玮,单进勇. 基于国产密码算法SM9的可追踪属性签名方案[J]. 电子与信息学报,2022,44(10):3610−3617

    Tang Fei, Ling Guowei, Shan Jinyong. Traceable attribute signature scheme based on domestic cryptographic SM9 algorithm[J]. Journal of Electronics & Information Technology, 2022, 44(10): 3610−3617 (in Chinese)
    [25]
    朱留富,李继国,赖建昌,等. 基于商密SM9的属性基在线/离线签名方案[J]. 计算机研究与发展,2023,60(2):362−370

    Zhu Liufu, Li Jiguo, Lai Jianchang, et al. Attribute-based online/offline signature scheme based on SM9[J]. Journal of Computer Research and Development, 2023, 60(2): 362−370 (in Chinese)
    [26]
    Boneh D, Boyen X. Short signatures without random oracles[C]//Proc of Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2004: 56−73
    [27]
    De Caro A, Iovino V. jPBC: Java pairing based cryptography[C]//Proc of IEEE Symp on Computers and Communications. Piscataway, NJ: IEEE, 2011: 850−855
    [28]
    Rouselakis Y, Waters B. Practical constructions and new proof methods for large universe attribute-based encryption[C]//Proc of the 2013 ACM SIGSAC Conf on Computer & Communications Security. New York: ACM, 2013: 463−474
  • Related Articles

    [1]Li Junwei, Liu Quan, Huang Zhigang, Xu Yapeng. A Diversity-Enriched Option-Critic Algorithm with Interest Functions[J]. Journal of Computer Research and Development, 2024, 61(12): 3108-3120. DOI: 10.7544/issn1000-1239.202220970
    [2]Zhao Rongmei, Sun Siyu, Yan Fanli, Peng Jian, Ju Shenggen. Multi-Interest Aware Sequential Recommender System Based on Contrastive Learning[J]. Journal of Computer Research and Development, 2024, 61(7): 1730-1740. DOI: 10.7544/issn1000-1239.202330622
    [3]Zhu Haiping, Wang Ziyu, Zhao Chengcheng, Chen Yan, Liu Jun, Tian Feng. Learning Resource Recommendation Method Based on Spatio-Temporal Multi-Granularity Interest Modeling[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440249
    [4]Liu Haijiao, Ma Huifang, Zhao Qiqi, Li Zhixin. Target Community Detection with User Interest Preferences and Influence[J]. Journal of Computer Research and Development, 2021, 58(1): 70-82. DOI: 10.7544/issn1000-1239.2021.20190775
    [5]Guo Kaihong, Han Hailong. Personalized Recommendation Model Based on Quantifier Induced by Preference[J]. Journal of Computer Research and Development, 2020, 57(1): 124-135. DOI: 10.7544/issn1000-1239.2020.20190166
    [6]Gao Ling, Gao Quanli, Wang Hai, Wang Wei, Yang Kang. A Preference Prediction Method Based on the Optimization of Basic Similarity Space Distribution[J]. Journal of Computer Research and Development, 2018, 55(5): 977-985. DOI: 10.7544/issn1000-1239.2018.20160924
    [7]Guo Chi, Wang Lina, Guan Yiping, Zhang Xiaoying. A Network Immunization Strategy Based on Dynamic Preference Scan[J]. Journal of Computer Research and Development, 2012, 49(4): 717-724.
    [8]Zou Bowei, Zhang Yu, Fan Jili, Zheng Wei, and Liu Ting. Research on Personalized Information Retrieval Based on User’s New Interest Detection[J]. Journal of Computer Research and Development, 2009, 46(9): 1594-1600.
    [9]Wang Zhenzhen, Xing Hancheng, and Chen Hanwu. On a Preference System of Agent and Its Construction[J]. Journal of Computer Research and Development, 2009, 46(2): 253-260.
    [10]Wu Jing, Zhang Pin, Luo Xin, Sheng Hao, and Xiong Zhang. Mining Interests and Navigation Patterns in Personalization on Portal[J]. Journal of Computer Research and Development, 2007, 44(8): 1284-1292.

Catalog

    Article views (39) PDF downloads (29) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return