Attribute-Based Designated Combiner Transitive Signature Scheme

Transitive signatures allow any entity to obtain a valid signature of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>i</mi><mo>,</mo><mi>k</mi>...

Full description

Saved in:
Bibliographic Details
Main Authors: Shaonan Hou, Shaojun Yang, Chengjun Lin
Format: Article
Language:English
Published: MDPI AG 2024-09-01
Series:Mathematics
Subjects:
Online Access:https://www.mdpi.com/2227-7390/12/19/3070
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850184955362017280
author Shaonan Hou
Shaojun Yang
Chengjun Lin
author_facet Shaonan Hou
Shaojun Yang
Chengjun Lin
author_sort Shaonan Hou
collection DOAJ
description Transitive signatures allow any entity to obtain a valid signature of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>i</mi><mo>,</mo><mi>k</mi><mo>)</mo></mrow></semantics></math></inline-formula> by combining signatures of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>i</mi><mo>,</mo><mi>j</mi><mo>)</mo></mrow></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>j</mi><mo>,</mo><mi>k</mi><mo>)</mo></mrow></semantics></math></inline-formula>. However, the traditional transitive signature scheme does not offer fine-grained control over the combiner. To address this issue, we propose a formal definition of the attribute-based designated combiner transitive signature (ABDCTS) and its security model, where only entities whose inherent attributes meet the access policy can combine signatures. By introducing the fine-grained access control structure, control over the combiner is achieved. To demonstrate the feasibility of our primitive, this paper presents the first attribute-based designated combiner transitive signature scheme. Under an adaptive chosen-message attack, we prove its security based on the one-more CDH problem and the co-CDH problem, and that its algorithms have robustness.
format Article
id doaj-art-c4ce62d2f3e443a8b2fa7c8f4b022eb1
institution OA Journals
issn 2227-7390
language English
publishDate 2024-09-01
publisher MDPI AG
record_format Article
series Mathematics
spelling doaj-art-c4ce62d2f3e443a8b2fa7c8f4b022eb12025-08-20T02:16:54ZengMDPI AGMathematics2227-73902024-09-011219307010.3390/math12193070Attribute-Based Designated Combiner Transitive Signature SchemeShaonan Hou0Shaojun Yang1Chengjun Lin2School of Mathematics and Statistics, Fujian Normal University, Fuzhou 350117, ChinaSchool of Mathematics and Statistics, Fujian Normal University, Fuzhou 350117, ChinaFujian Key Laboratory of Financial Information Processing, Putian University, Putian 351100, ChinaTransitive signatures allow any entity to obtain a valid signature of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>i</mi><mo>,</mo><mi>k</mi><mo>)</mo></mrow></semantics></math></inline-formula> by combining signatures of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>i</mi><mo>,</mo><mi>j</mi><mo>)</mo></mrow></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>j</mi><mo>,</mo><mi>k</mi><mo>)</mo></mrow></semantics></math></inline-formula>. However, the traditional transitive signature scheme does not offer fine-grained control over the combiner. To address this issue, we propose a formal definition of the attribute-based designated combiner transitive signature (ABDCTS) and its security model, where only entities whose inherent attributes meet the access policy can combine signatures. By introducing the fine-grained access control structure, control over the combiner is achieved. To demonstrate the feasibility of our primitive, this paper presents the first attribute-based designated combiner transitive signature scheme. Under an adaptive chosen-message attack, we prove its security based on the one-more CDH problem and the co-CDH problem, and that its algorithms have robustness.https://www.mdpi.com/2227-7390/12/19/3070attribute-basedtransitive signaturefine-grained control
spellingShingle Shaonan Hou
Shaojun Yang
Chengjun Lin
Attribute-Based Designated Combiner Transitive Signature Scheme
Mathematics
attribute-based
transitive signature
fine-grained control
title Attribute-Based Designated Combiner Transitive Signature Scheme
title_full Attribute-Based Designated Combiner Transitive Signature Scheme
title_fullStr Attribute-Based Designated Combiner Transitive Signature Scheme
title_full_unstemmed Attribute-Based Designated Combiner Transitive Signature Scheme
title_short Attribute-Based Designated Combiner Transitive Signature Scheme
title_sort attribute based designated combiner transitive signature scheme
topic attribute-based
transitive signature
fine-grained control
url https://www.mdpi.com/2227-7390/12/19/3070
work_keys_str_mv AT shaonanhou attributebaseddesignatedcombinertransitivesignaturescheme
AT shaojunyang attributebaseddesignatedcombinertransitivesignaturescheme
AT chengjunlin attributebaseddesignatedcombinertransitivesignaturescheme