Abstract
In an attribute-based strong designated verifier signature, a signer who satisfies the access structure signs the message and assigns it to a verifier who satisfies the access structure to verify it, which enables fine-grained access control for signers and verifiers. Such signatures are used in scenarios where the identity of the signer needs to be protected, or where the public verifiability of the signature is avoided and only the designated recipient can verify the validity of the signature. To address the problem that the overall overhead of the traditional attribute-based strong designated verifier signature scheme is relatively large, an efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography is proposed, as well as a security analysis of the new scheme given in the standard model under the difficulty of the elliptic curve discrete logarithm problem (ECDLP). On the one hand, the proposed scheme is based on elliptic curve cryptography and uses scalar multiplication on elliptic curves, which is computationally lighter, instead of bilinear pairing, which has a higher computational overhead in traditional attribute-based signature schemes. This reduces the computational overhead of signing and verification in the system, improves the efficiency of the system, and makes the scheme more suitable for resource-constrained cloud end-user scenarios. On the other hand, the proposed scheme uses LSSS (Linear Secret Sharing Schemes) access structure with stronger access policy expression, which is more efficient than the "And" gate or access tree access structure, making the computational efficiency of the proposed scheme meet the needs of resource-constrained cloud end-users.
Funder
Jinhua Public Welfare Technology Application Research Project in 2022
Publisher
Public Library of Science (PLoS)
Reference59 articles.
1. Designated verifier proofs and their applications;M Jakobsson;Lecture Notes in Computer Science,1996
2. An efficient strong designated verifier signature scheme,”;S Saeednia;Lecture Notes in Computer Science,2004
3. A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT;S Ding;IEEE Access,2018
4. Efficient signature generation by smart cards;C. Schnor;Journal of Cryptology,1991
5. Digital signcryption or how to achieve cost (signature & encryption) << cost (signature)+ cost (encryption);Y. Zheng;Advances in Cryptology, Crypto’97, Lecture Notes in Computer Science,1997