Attribute-Based Designated Combiner Transitive Signature Scheme
Transitive signatures allow any entity to obtain a valid signature of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>i</mi><mo>,</mo><mi>k</mi>...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-09-01
|
| Series: | Mathematics |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2227-7390/12/19/3070 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850184955362017280 |
|---|---|
| author | Shaonan Hou Shaojun Yang Chengjun Lin |
| author_facet | Shaonan Hou Shaojun Yang Chengjun Lin |
| author_sort | Shaonan Hou |
| collection | DOAJ |
| description | Transitive signatures allow any entity to obtain a valid signature of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>i</mi><mo>,</mo><mi>k</mi><mo>)</mo></mrow></semantics></math></inline-formula> by combining signatures of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>i</mi><mo>,</mo><mi>j</mi><mo>)</mo></mrow></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>j</mi><mo>,</mo><mi>k</mi><mo>)</mo></mrow></semantics></math></inline-formula>. However, the traditional transitive signature scheme does not offer fine-grained control over the combiner. To address this issue, we propose a formal definition of the attribute-based designated combiner transitive signature (ABDCTS) and its security model, where only entities whose inherent attributes meet the access policy can combine signatures. By introducing the fine-grained access control structure, control over the combiner is achieved. To demonstrate the feasibility of our primitive, this paper presents the first attribute-based designated combiner transitive signature scheme. Under an adaptive chosen-message attack, we prove its security based on the one-more CDH problem and the co-CDH problem, and that its algorithms have robustness. |
| format | Article |
| id | doaj-art-c4ce62d2f3e443a8b2fa7c8f4b022eb1 |
| institution | OA Journals |
| issn | 2227-7390 |
| language | English |
| publishDate | 2024-09-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Mathematics |
| spelling | doaj-art-c4ce62d2f3e443a8b2fa7c8f4b022eb12025-08-20T02:16:54ZengMDPI AGMathematics2227-73902024-09-011219307010.3390/math12193070Attribute-Based Designated Combiner Transitive Signature SchemeShaonan Hou0Shaojun Yang1Chengjun Lin2School of Mathematics and Statistics, Fujian Normal University, Fuzhou 350117, ChinaSchool of Mathematics and Statistics, Fujian Normal University, Fuzhou 350117, ChinaFujian Key Laboratory of Financial Information Processing, Putian University, Putian 351100, ChinaTransitive signatures allow any entity to obtain a valid signature of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>i</mi><mo>,</mo><mi>k</mi><mo>)</mo></mrow></semantics></math></inline-formula> by combining signatures of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>i</mi><mo>,</mo><mi>j</mi><mo>)</mo></mrow></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>j</mi><mo>,</mo><mi>k</mi><mo>)</mo></mrow></semantics></math></inline-formula>. However, the traditional transitive signature scheme does not offer fine-grained control over the combiner. To address this issue, we propose a formal definition of the attribute-based designated combiner transitive signature (ABDCTS) and its security model, where only entities whose inherent attributes meet the access policy can combine signatures. By introducing the fine-grained access control structure, control over the combiner is achieved. To demonstrate the feasibility of our primitive, this paper presents the first attribute-based designated combiner transitive signature scheme. Under an adaptive chosen-message attack, we prove its security based on the one-more CDH problem and the co-CDH problem, and that its algorithms have robustness.https://www.mdpi.com/2227-7390/12/19/3070attribute-basedtransitive signaturefine-grained control |
| spellingShingle | Shaonan Hou Shaojun Yang Chengjun Lin Attribute-Based Designated Combiner Transitive Signature Scheme Mathematics attribute-based transitive signature fine-grained control |
| title | Attribute-Based Designated Combiner Transitive Signature Scheme |
| title_full | Attribute-Based Designated Combiner Transitive Signature Scheme |
| title_fullStr | Attribute-Based Designated Combiner Transitive Signature Scheme |
| title_full_unstemmed | Attribute-Based Designated Combiner Transitive Signature Scheme |
| title_short | Attribute-Based Designated Combiner Transitive Signature Scheme |
| title_sort | attribute based designated combiner transitive signature scheme |
| topic | attribute-based transitive signature fine-grained control |
| url | https://www.mdpi.com/2227-7390/12/19/3070 |
| work_keys_str_mv | AT shaonanhou attributebaseddesignatedcombinertransitivesignaturescheme AT shaojunyang attributebaseddesignatedcombinertransitivesignaturescheme AT chengjunlin attributebaseddesignatedcombinertransitivesignaturescheme |