Abstract
Transitive signatures allow any entity to obtain a valid signature of by combining signatures of and . However, the traditional transitive signature scheme does not offer fine-grained control over the combiner. To address this issue, we propose a formal definition of the attribute-based designated combiner transitive signature (ABDCTS) and its security model, where only entities whose inherent attributes meet the access policy can combine signatures. By introducing the fine-grained access control structure, control over the combiner is achieved. To demonstrate the feasibility of our primitive, this paper presents the first attribute-based designated combiner transitive signature scheme. Under an adaptive chosen-message attack, we prove its security based on the one-more CDH problem and the co-CDH problem, and that its algorithms have robustness.
MSC:
68Q99
1. Introduction
A digital signature is an important technology in the cryptography for protecting data security. It uses specific algorithms to verify the source and integrity of data, and is typically used to ensure the authenticity of network data and to prevent data tampering. Currently, digital signatures are widely used in electronic contract, electronic voting, electronic payment, and other fields.
Traditional digital signatures only involve simple signing and verification services, which obviously cannot meet the needs of some scenarios. Fo exaple, given an administrative domain with n nodes; clearly, a graph with n nodes can have edges, and when using a traditional digital signature to authenticate the entire graph, we need to sign each edge, which will result in the signing complexity, as . In order to optimize the authentication operations of large-graph data, Micali and Rivest [1] proposed the concept of a transitive signature, allowing any entity to obtain an effective signature of by combining two signatures of and . Thus, a valid signature for can be obtained by combining any signature chain of edge sequences on the path from i to j. This only requires signatures to authenticate the entire administrative domain, thereby greatly reducing the signing complexity.
Even though the ability to combine signatures offers great convenience for authenticating large-graph data, in some cases, the signer might not want that combinability to be public. As shown in Figure 1, a chairman provides each member of his company a transitive signature, but only wants the department manager Alice (resp., Bob) to be able to combine his team A (resp., B) members’ signatures, while the others cannot. To achieve this goal, one solution is to issue public and private keys to each manager, and then use their public keys to disguise the signatures of their team members. However, this approach would result in a high cost. Another measure is to establish an access control policy to achieve fine-grained control over combiners, allowing only entities with both “A” and “manager” attributes to combine the signatures of A department members. Access control policy is a kind of authorization. The signer sets an access control policy that authorizes the combination capability of transitive signatures to entities with a specific set of attributes, that is, entities that do not meet the access control policy cannot combine signatures. In 2000, Rivest posed an open question: how to design transitive signature with a designated combiner, allowing only the entity specified by the signer to have the ability to combine signatures. There is currently no proposed transitive signature with a designated combiner, making further research in this area worthwhile.
Figure 1.
An administrative domain that includes multiple departments like A and B.
1.1. Relate Works
The concept of transitive signatures was proposed by Micali and Rivest [1] in 2002. They designed two schemes based on the discrete logarithm problem and the RSA problem, but the security of the RSA-based scheme is limited to non-adaptive chosen message attacks. In 2005, Bellare and Neven [2,3] proposed multiple transitive signature schemes based on RSA, one-more discrete logarithm problem, and one-more gap Diffie–Hellman problem, all of which offer performance improvements greater than [1]. To address the efficiency issues caused by using special hash functions in the schemes, Lin et al. [4] introduced a scheme constructed using general hash functions, significantly improving efficiency by reducing computation time.
Hou et al. [5] proposed the universal designated verifier transitive signature (UDVTS) scheme for preventing transitive signature abuse. Zhu et al. [6] introduced the universal designated multiple verifier transitive signature (UDMVTS), a variant with multiple designated verifiers. Lin et al. [7] improved the UDVTS scheme efficiency with an RSA-based approach. Hou et al. [8] proposed a scheme with traceability features to resolve the signature dispute of UDVTS, introducing a tracer into the system to be able to trace back to the true source of the signature.
Lattice-based cryptosystems can withstand quantum computing attacks, unlike other cryptosystems that are vulnerable to such threats. In 2019, Geontae et al. [9] designed two lattice-based signature schemes under the random oracle model and the standard model, marking the first research on lattice-based signatures. Subsequently, Geontae et al. [10] combined the idea of identity-based signatures to design an identity-based lattice signature scheme.
This article will concisely introduce the access structure of the scheme. In 2011, Waters [11] proposed a method for describing any boolean function related to attribute control using a linear secret sharing scheme. Inspired by [11], numerous digital signature schemes have emerged, enabling fine-grained control over the signer or message, such as: [12,13,14].
1.2. Our Contributions
This paper aims to develop a transitive signature scheme enabling precise control over combiners, allowing the signer to designate specific entities with certain attributes for combined operations. The signer sets varying access control policies for combiners based on different data types, controlling “who can combine what data”. The main contributions of this paper are summarized as follows:
- This study presents a new access control mechanism for transitive signature combiners, and formally defines attribute-based designated combiner transitive signature and its security models. It also suggests a method to finely regulate unauthorized combined operations.
- We propose the first construction of the attribute-based designated combiner transitive signature (ABDCTS). Our proposal introduces ABDCTS via a monotone span program and linear secret sharing scheme, concealing transitive signatures by a secret, such that only those meeting specific attributes can reveal and combine it. Its security is subsequently demonstrated based on the one-more CDH problem and the co-CDH problem.
2. Definitions and Preliminaries
This section introduces some general notations and reviews some related concepts.
2.1. Notions
We introduce some symbols and their definitions in Table 1.
Table 1.
Symbols and their definitions.
2.2. Bilinear Groups and Complexity Assumptions
Definition 1
([15]). Let and be three cyclic groups of large prime order p, with a bilinear map . If is referred to as a bilinear group tuple, then it satisfies the following conditions:
- 1.
- e can be efficiently computed.
- 2.
- and , .
- 3.
- If h and g generates and , respectively, then generates .
- 4.
- Isomorphism can be efficiently computed.
Definition 2
(one-more CDH problem [16]). Given g and for unknown , and two oracles and as follows:
- : input a point i, output a random point from .
- : input a point , output .
We say that an adversary solves one-more CDH problem if he successfully outputs the CDH value of n points while calling less than n.
Definition 3
(co-CDH problem [17]). Given and for unknown , compute .
2.3. Access Structure
Definition 4
([18]). Let be a set of parties. We refer to an access structure as monotonic if implies that . If (resp., ), then D is called an authorized (resp., unauthorized) set.
2.4. Monotone Span Program (MSP)
Definition 5
([19]). Consider a field K and a set of variables . A monotone span program over K is represented by a labeled matrix , where is a matrix over K, and ρ labels the rows of with literals from (each row is labeled by one literal). This program accepts or rejects inputs based on whether a linear combination of rows labeled by literals in the input set yields the all-one vector . The size of the program is determined by the number of rows in the matrix .
We use MSP to convert a monotone boolean function into an equivalent matrix, with the specific process as follows: we convert the monotone boolean formula into an access binary tree using the method described in [19]. In a binary tree, each internal node represents an AND or OR gate, while the leaf nodes represent the attributes.
Converting a binary tree into an equivalent matrix E can be achieved using the method outlined in [20]. Each tree node is assigned a vector. Initially, the vector of the root node is . The setting method for the vectors on the rest of the internal nodes is as follows: if the parent node represents an OR gate, the vectors of both left and right child nodes are equal to the parent node vector; if the parent node represents an AND gate, the vectors of the left and right child nodes are and , respectively. After labeling the entire tree, if the lengths of vectors of all of the leaf nodes are unequal, append (0,⋯,0) to the right of the shorter vectors until all of the lengths are equal. The vectors from all of the leaf nodes constitute a linear secret sharing matrix.
Figure 2 shows an conversion example: . In the example in Figure 2, the vector represents the set of variables as an input to . as the combination of the first, second, and third rows of matrix can span . This satisfies the policy for . In our context, attributes will replace parties, labeling each row of matrix .
Figure 2.
Converting a binary tree to a matrix.
2.5. Linear Secret-Sharing Scheme (LSSS))
Definition 6
([18]). A secret sharing scheme for a set S and a access structure is called linear (over ) if:
- 1.
- Each share value of the secret forms a vector over .
- 2.
- For each access structure on set S, there exits a sharing-generating matrix . Define a function ρ that labels the i-th row of as . Let be a vector, where are chosen randomly in . is a column vector with t secret sharing values of s, where the i-th row represents the share allocated to the entity corresponding to .
Ref. [18] presents a model that equivalently converts the matrix of MSP into the sharing-generating matrix of LSSS. Taking the matrix in Figure 2 as an example, we use it as the sharing-generating matrix for LSSS. Let , and at this point, is an authorized set, then there exists constants such that . Ref. [21] has already proven that can be found in polynomial time.
Lemma 1
(Forking Lemma [22]). Let Π be a signature scheme, k be the security parameter, and be a PPT adversary. If can, within time T and with at most and inquiries to the random oracle and the sign oracle, respectively, output a valid signature with probability , then he can output two valid signatures and with probability within time , such that .
3. Attribute-Based Designated Combiner Transitive Signature Scheme
This section provides the formal definitions of ABDCTS and its security models.
3.1. The Formal Definition of ABDCTS
Unlike traditional transitive signature, ABDCTS allows the signer to set an access control policy at the time of signing, so only entities that meet can perform combination operations on the signature, as shown in Figure 3. A ABDCTS scheme consists of seven PPT algorithms = (Setup, SKGen, TSign, AKGen, DVry, Comp, Vry).
Figure 3.
Flowchart of ABDCTS.
- . The algorithm takes the security parameter k as the input and outputs the public parameters and the master secret key .
- . The algorithm takes the public parameters as the input and outputs the signer’s public/secret key pairs .
- . The algorithm takes the signer’s secret key and nodes as the input. It outputs a signature of edge and an access control policy of combiners (it is specified by the signer).
- . The algorithm takes the master secret key and a set of attributes S as the input. It outputs a secret key specific to S.
- . The algorithm takes the signer’s public key , nodes , a set of attributes S, a secret key , an access control policy , and a signature as the input. It outputs 1 (accept) or 0 (reject).
- . The algorithm takes a public key , a set of attributes S, a secret key , an access control policy , nodes , and two signatures as the input. It outputs the composed signature on edge or ⊥.
- . The algorithm takes the signer’s public key , nodes , and a combined signature as the input. It outputs 1 (accept) or 0 (reject).
Next, we introduce ABDCTS’s correctness requirements.
- Correctness of the Sign algorithm. For , it holds that
- Correctness of the Comp algorithm. For the output of Comp, if both and are are accepted by DVry, it holds that
3.2. Security Models
An attribute-based designated combiner transitive signature scheme should satisfy the following security requirements.
Collusion resistance. Collusion resistance requires that no entity can collaborate with other entities to combine transitive signatures without having the specified attributes.
Unforgeability. Unforgeability requires that only the signer and entities with specific attributes can generate valid signatures. Therefore, the unforgeability of ABDCTS is divided into the following two types: Type 1 Unforgeability () requires that no adversary can forge a signature on a new edge (where no complete path from i to j has been signed by the signer), and because the entity with specific attributes has the most knowledge, the adversary can be seen as a malicious combiner. The malicious combiner can request the transitive signature of some edges and has the ability to combine signatures. Type 2 Unforgeability () requires that entities whose own attributes do not satisfy the access policy cannot combine signatures. In this case, the adversary may request transitive signatures and combined signatures of some edges, and he can also ask for the attribute keys corresponding to some sets of attributes, but those attribute sets do not meet the access control policy.
The formal definition of is outlined through the following game between a challenger and an adversary .
Definition 7.
A ABDCTS scheme satisfies if any PPT adversary has a negligible advantage in the following game :
- Setup: runs Setup and SKGen to generate and , respectively. Then, is sent to .
- TSign Queries: Proceeding adaptively, picks an edge . Then, runs TSign to generate and sends it to .
- Output: outputs a pair .
wins the game if and , where G is made up of all edges that have been queried.
The formal definition of is outlined through the following game between a challenger and an adversary . The advantage of is
Definition 8.
A ABDCTS scheme satisfies if any PPT adversary has a negligible advantage in the following game :
- Setup: runs Setup and SKGen to generate and , respectively. Then, is sent to .
- TSign Queries: Proceeding adaptively, picks an edge . Then, runs TSign to generate and sends it to .
- AKGen Queries: Proceeding adaptively, requests the secret key for attribute sets that that fail to meet the access structure .
- Comp Queries: Proceeding adaptively, runs Comp to output the combined signature σ after submits .
- Output: outputs a pair .
wins the game if and was not submitted to Comp Queries. The advantage of is
4. Our Construction
We reviewed the linear homomorphic signature scheme with the designated combiner provided in [23]; they used a random value to encrypt the signature , and only the signer or the designated combiner who can successfully calculate that random value can remove the disguise from signatures (e.g., and ) and combine them to obtain . After that, the designated combiner uses the technology of IBS to generate reliable evidence to show the verifier that they have .
Our approach draws from [23]. The signer calculates a hash value to conceal signature , and the published signature is , where the hash value is tied to the access control policy set by the signer. Then, the key generation center distributes the key for calculating the hash value according to the access control policy, sharing them according to the corresponding attributes. Only entities whose attribute sets meet the access policy can successfully compute and obtain the original signature . After combining signatures and to obtain , the combiner uses the method of IBS to generate evidence to prove to other entities that they possess the signature .
We construct our ABDCTS scheme = (Setup, SKGen, TSign, AKGen, DVry, Comp, Vry) as follows:
- Setup(. Take as input the security parameter k:
- Let a bilinear group tuple , as defined in Definition 1.
- Let h and g be the generators of and , respectively.
- Pick five hash functions , , , and .
- Let be the set that includes all attributes.
- Pick and set .
- Output the public parameters and the master secret key .
- SKGen(. The signer chooses as and sets as .
- TSign(). Take and nodes as the input:
- Set the access structure for U, meaning the combiner is designated by the signer.
- Characterize as a monotone Boolean function and convert it into an access binary tree based on MSP.
- Convert into a matrix based on MSP and define as the i-th row vector of matrix .
- Calculate .
- Compute , where .
- Output and .
- AKGen. Take , the access structure , and a set of attributes as the input:
- Choose and calculate .
- Compute and .
- Output the secret key specific to S.
- DVry(). Take , nodes , and a signature as the input:
- If , it returns ⊥.
- If , there are constants , such that .
- If , then it outputs 1 (accept). Otherwise, it outputs 0 (reject).
- Comp(). The algorithm does the following:
- Check the validity of by runing DVry. If either or is not valid, it returns ⊥.
- Compute and and .
- Compute .
- Pick and calculate , and .
- Output and a signature .
- Vry(). Take , nodes , and a signature as the input:
- Calculate .
- If , then it outputs 1 (accept). Otherwise, it outputs 0 (reject).
The correctness of the scheme is as follows:
- Correctness of the Sign algorithm. For , we have:
- Correctness of the Comp algorithm. For the output and of Comp, if both and are valid, then we have:
5. Security Analysis
This section analyzes the security of our proposed ABDCTS scheme. With attribute-based cryptosystems, a key challenge is preventing user collusion. The scheme proposed in this paper is akin to [11], where the user’s attribute private key is randomized, preventing the merging of different users’ keys. More precisely, this paper incorporates secret in the signature, then allocates shares linked to attributes to each combiner via LSSS. Only combiners whose attributes meet the access structure can reconstruct the secret, verify the signature, and combine it. Due to the use of different random numbers in assigning secret shares to various combiners, collusion attempts among users will prove futile.
Assuming an adversary has compromised the signature scheme in , we construct a challenger who can simulate the signature scheme, and solve the one-more CDH problem in . Similarly, we show that the presence of a successful adversary allows challenger to solve the co-CDH problem in .
Theorem 1.
Let Π be the ABDCTS scheme described above. If the one-more CDH problem is difficult, then Π satisfies against an adaptive chosen-message attack.
Proof.
let be a PPT adversary. Define
Our goal is to build a PPT algorithm to solve one-more CDH problem in : given a tuple and two oracles and , output the CDH solution with respect to of all n points output by , using strictly less than n calls to its .
maintains two lists , , to record the output values of , and TSign Queries, respectively. The game is described as follows:
- Setup.
- sets and the parameter .
- Sends to .
- . When requests the value of , answer it as follows:
- If is found in list , will be returned.
- Otherwise, calculates and adds to .
- Sends to .
- . When requests the value of , answer it as follows:
- If is found in list , will be returned.
- Otherwise, picks , calculates and adds to .
- Sends to .
- TSign Queries. When requests a signature of , answer it as follows:
- If , then swap i and j.
- If is found in list , will be returned.
- Otherwise, calculates and adds to .
- If is found in list , will be returned.
- Otherwise, calculates and adds to .
- If is found in list , will be returned.
- Otherwise, picks , calculates and adds to .
- If is found in list , will be returned.
- Otherwise, sets the combiner control policy and picks .
- Then calculates and , and adds to .
- Sends to .
- Output. Eventually, outputs a tuple , where , and for chosen by . The output of the experiment is 1 if and is a new edge.
We have:
Therefore . Calculate the CDH values of all vertices in using the following method. First, divides all of the vertices into m disjoint sets , where but .
For , selects , then:
- .
- For .
- .
For , does the following:
- .
- For .
- .
It is clearly visible that outputs the CDH value of vertices, but only calls times. Thus, solves the one-more CDH problem, and the probability □
Theorem 2.
Let Π be the ABDCTS scheme described above. If the co-CDH problem is challenging, then Π satisfies against an adaptive chosen-message attack.
Proof.
let be a PPT adversary. Define
Our goal is to build a PPT algorithm to solve co-CDH problem in : given a bilinear group tuple and , output , where , and .
maintains two lists , , , to record the output values of , , TSign Queries and , respectively. The game is described as follows:
- Setup.
- sets and the parameter .
- Sends to .
- . When requests the value of , answer it as follows:
- If is found in list , will be returned.
- Otherwise, picks , calculates and adds to .
- Sends to .
- . When requests the value of , answer it as follows:
- If is found in list , will be returned.
- Otherwise, picks , calculates and adds to .
- Sends to .
- TSign Queries. When requests a signature of , answer it as follows:
- If , then swap i and j.
- If is found in list , will be returned.
- Otherwise, picks , calculates and adds to .
- If is found in list , will be returned.
- Otherwise, picks , calculates and adds to .
- If is found in list , will be returned.
- Otherwise, picks , calculates and adds to .
- If is found in list , will be returned.
- Otherwise, sets the combiner control policy and picks .
- Then calculates and adds to .
- Sends to .
- AKGen Queries. When requests the private key corresponding to the attribute set S, where S does not satisfy , answer it as follows:
- For all , picks and calculates .
- sends to .
- . When requests the value of , answer it as follows:
- If is found in list , will be returned.
- Otherwise, picks and adds to .
- Comp Queries. When submits to Comp Queries, answer it as follows:
- If and are both valid, calculates and .
- calculates .
- picks and computes .
- submits to to obtain and computes .
- Adds to and sends to .
- Output. Eventually, outputs a tuple , where , and for chosen by . The output of the experiment is 1 if and does not belong to list .
Therefore, can output a valid forgery on with probability under the conditions of time t, and inquiries to and Comp Queries, respectively.
When we replay the attack, if , the lists and remain unchanged. If , we randomly select values again according to the above simulation process. For , we select and set . Note that cannot query Comp Queries.
By using the technique in forking lemma, can output two valid forgeries and with a probability of after conducting replay attacks up to .
For , we have and compute and .
As both and are valid; therefore,
and
Combining both equations provides:
As is random in , the probability that is . Therefore, . In other words, the probability that solves the co-CDH problem is □
Efficiency
Let , and be the bit length of the element in , and , respectively. Let be the computation cost of performing one , , , , and operation, respectively. Let and be the public key and signature size of a standard digital signature, respectively.
Taking algorithm TSign as an example, we need to perform one and one operation to obtain c, and then perform one , , , one and operation. Thus, the computation cost of TSign is . The detailed analysis results are shown in Table 2. In addition, we make a rough comparison of communication costs with some existing transitive signatuer schemes in Table 3. By comparing the computational cost, public key size, and signature size with some existing signature schemes, it is clear that our scheme has good practicality.
Table 2.
Comparisons of computation costs.
Table 3.
Comparison to the existing transitive signature scheme for the undirected graph.
6. Conclusions
The paper introduces the formal definitions of ABDCTS and its security models, where the signer can set fine-grained combiner control policy, so that entities that do not satisfy the access policy of the attribute set cannot combine signatures. ABDCTS provides a solution for granting different entities the ability to combiner transitive signatures based on varied data requirements. Subsequently, a specific construction is proposed, and its security is proven based on the one-more CDH problem and the co-CDH problem in the random model. We analyze the communication cost and computational cost, showing that the scheme is quite practical. The public key, the transitive signature, and the combined siganture in our construction are bits, bits, and , respectively.
Author Contributions
Conceptualization, S.H., S.Y. and C.L.; methodology, S.H., S.Y. and C.L.; writing—original draft preparation, S.H.; writing—review and editing, S.Y. and C.L.; supervision, S.Y. and C.L.; project administration, S.Y. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the National Natural Science Foundation of China (62272104, 62032005, 62172096).
Data Availability Statement
Data are contained within the article.
Acknowledgments
The authors gratefully acknowledge the editor and the anonymous reviewers for their comments that improved the final version of the manuscript.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Micali, S.; Rivest, R.L. Transitive Signature Schemes. In Proceedings of the Topics in Cryptology, San Jose, CA, USA, 18–22 February 2002; pp. 236–243. [Google Scholar] [CrossRef]
- Bellare, M.; Neven, G. Transitive signatures: New schemes and proofs. IEEE Trans. Inf. Theory 2005, 51, 2133–2151. [Google Scholar] [CrossRef]
- Bellare, M.; Neven, G. Transitive Signatures Based on Factoring and RSA. In Proceedings of the Advances in Cryptology, Santa Barbara, CA, USA, 18–22 August 2002; pp. 397–414. [Google Scholar] [CrossRef]
- Lin, C.; Zhu, F.; Wu, W.; Liang, K.; Choo, K.K.R. A New Transitive Signature Scheme. In Proceedings of the Network and System Security, Taipei, Taiwan, 28–30 September 2016; pp. 156–167. [Google Scholar] [CrossRef]
- Hou, S.; Huang, X.; Liu, J.K.; Lin, J.; Xu, L. Universal designated verifier transitive signatures for graph-based big data. Inf. Sci. 2015, 318, 144–156. [Google Scholar] [CrossRef]
- Zhu, F.; Zhang, Y.; Lin, C.; Wu, W.; Meng, R. A Universal Designated Multi-Verifier Transitive Signature Scheme. In Proceedings of the Information Security and Cryptology, Fuzhou, China, 14–17 December 2018; pp. 180–195. [Google Scholar] [CrossRef]
- Lin, C.; Wu, W.; Huang, X.; Xu, L. A new universal designated verifier transitive signature scheme for big graph data. J. Comput. Syst. Sci. 2017, 83, 73–83. [Google Scholar] [CrossRef]
- Hou, S.; Lin, C.; Yang, S. A Traceable Universal Designated Verifier Transitive Signature Scheme. Information 2024, 15, 43. [Google Scholar] [CrossRef]
- Noh, G.; Jeong, I.R. Transitive Signature Schemes for Undirected Graphs from Lattices. KSII Trans. Internet Inf. Syst. 2019, 13, 3316–3332. [Google Scholar] [CrossRef]
- Noh, G.; Chun, J.Y. Identity-Based Transitive Signature Scheme from Lattices. J. Korea Inst. Inf. Secur. Cryptol. 2021, 31, 509–516. [Google Scholar]
- Waters, B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Proceedings of the International Workshop on Public Key Cryptography, Taormina, Italy, 6–9 March 2011; pp. 53–70. [Google Scholar] [CrossRef]
- Ma, J.; Liu, J.; Huang, X.; Xiang, Y.; Wu, W. Authenticated Data Redaction with Fine-Grained Control. IEEE Trans. Emerg. Top. Comput. 2020, 8, 291–302. [Google Scholar] [CrossRef]
- Zhang, Z.; Zhou, S. A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things. Comput. Netw. 2021, 201, 108553. [Google Scholar] [CrossRef]
- Zhang, Z.; Huang, W.; Cai, S.; Yang, L.; Liao, Y.; Zhou, S. An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing. Comput. Commun. 2022, 196, 9–22. [Google Scholar] [CrossRef]
- Menezes, A.; Vanstone, S.A.; Okamoto, T. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 1991, 39, 1639–1646. [Google Scholar] [CrossRef]
- Boldyreva, A. Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In Proceedings of the Public Key Cryptography, Paris, France, 12–14 February 2002; pp. 31–46. [Google Scholar] [CrossRef]
- Boneh, D.; Lynn, B.; Shacham, H. Short signatures from the Weil pairing. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, 9–13 December 2001; pp. 514–532. [Google Scholar] [CrossRef]
- Beimel, A. Secure Schemes for Secret Sharing and Key Distribution. Ph.D. Thesis, Technion-Israel Institute of Technology, Haifa, Israel, 1996. Available online: https://technion.primo.exlibrisgroup.com/permalink/972TEC_INST/q1jq5o/alma990021768270203971 (accessed on 26 September 2024).
- Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–3 November 2006; pp. 89–98. [Google Scholar] [CrossRef]
- Liu, J.; Huang, X.; Liu, J.K. Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption. Future Gener. Comput. Syst. 2015, 52, 67–76. [Google Scholar] [CrossRef]
- Karchmer, M.; Wigderson, A. On Span Programs. In Proceedings of the Eigth Annual Structure in Complexity Theory Conference, San Diego, CA, USA, 18–21 May 1993; pp. 102–111. [Google Scholar] [CrossRef]
- Pointcheval, D.; Stern, J. Security arguments for digital signatures and blind signatures. J. Cryptol. 2000, 13, 361–396. [Google Scholar] [CrossRef]
- Lin, C.; Xue, R.; Huang, X. Linearly Homomorphic Signatures with Designated Combiner. In Proceedings of the Provable and Practical Security, Guangzhou, China, 5–8 November 2021; pp. 327–345. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).


