Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Efficient and provably secured puncturable attribute-based signature for Web 3.0

Published: 01 March 2025 Publication History

Abstract

Web 3.0 is a grand design with intricate data interchange, implying the requirement of versatile network protocol to ensure its security. Attribute-based signature (ABS) allows a user, who is featured with a set of attributes, to sign messages under a predicate. The validity of the ABS signature demonstrates that this signature is generated by the user whose attributes satisfy the corresponding predicate, and thus flexibly achieves anonymous authentication. Similar to other digital signatures, the security of ABS is broken in case the private key of the user is leaked out. To address the threat brought by the key leakage, this paper proposes a puncturable attribute-based signature scheme that allows the private key generator to revoke the signing right associated with specific tags. This paper firstly elaborates the construction of the proposed ABS scheme with puncturable property, and then proves its security theoretically by reducing the involved security to the computational Diffie–Hellman assumption. This paper then experimentally shows that the suggested puncturable ABS scheme owns a more efficient storage cost and superior performance.

Highlights

We resolved the latent risks concerning security and privacy in Web 3.0.
A puncturable ABS scheme with privacy prevention and resilience to key leakage attack.
The scheme is based on Diffie Hellman assumption, and it has high efficiency.

References

[1]
Hendler J., Web 3.0 emerging, Computer 42 (1) (2009) 111–113,.
[2]
Cao B., Zhang L., Zhang L., Kanhere S., Sun C., Niyato D., Advanced networking and applications for metaverse and web 3.0, IEEE Netw. 37 (6) (2023) 8–9,.
[3]
Fan S., Yecies B., Zhou Z.I., Shen J., Challenges and opportunities for the web 3.0 metaverse turn in education, IEEE Trans. Learn. Technol. (2024) 1–17,.
[4]
M. R, M. Janani, S. Rithika, S.K. Shrinaya, S. Swetha, Web 3.0: A Decentralized Future Empowered by Blockchain, in: 2023 Third International Conference on Smart Technologies, Communication and Robotics, STCR, Vol. 1, 2023, pp. 1–7, https://doi.org/10.1109/STCR59085.2023.10397036.
[5]
F.A. Alabdulwahhab, Web 3.0: The Decentralized Web Blockchain networks and Protocol Innovation, in: 2018 1st International Conference on Computer Applications & Information Security, ICCAIS, 2018, pp. 1–4, https://doi.org/10.1109/CAIS.2018.8441990.
[6]
Diffie W., Hellman M., New directions in cryptography, IEEE Trans. Inform. Theory 22 (6) (1976) 644–654,.
[7]
S. Dziembowski, K. Pietrzak, Leakage-Resilient Cryptography, in: 2008 49th Annual IEEE Symposium on Foundations of Computer Science, 2008, pp. 293–302, https://doi.org/10.1109/FOCS.2008.56.
[8]
Goldwasser S., Kalai Y.T., Rothblum G.N., One-time programs, in: Wagner D. (Ed.), Advances in Cryptology – CRYPTO 2008, Springer Berlin Heidelberg, Berlin, Heidelberg, 2008, pp. 39–56.
[9]
Micali S., Reyzin L., Physically observable cryptography, in: Naor M. (Ed.), Theory of Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 278–296.
[10]
Maji H.K., Prabhakaran M., Rosulek M., Attribute-based signatures, in: Kiayias A. (Ed.), Topics in Cryptology – CT-RSA 2011, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011, pp. 376–392.
[11]
Shamir A., Identity-based cryptosystems and signature schemes, in: Blakley G.R., Chaum D. (Eds.), Advances in Cryptology, Springer Berlin Heidelberg, Berlin, Heidelberg, 1985, pp. 47–53.
[12]
Chaum D., van Heyst E., Group signatures, in: Davies D.W. (Ed.), Advances in Cryptology — EUROCRYPT ’91, Springer Berlin Heidelberg, Berlin, Heidelberg, 1991, pp. 257–265.
[13]
Rivest R.L., Shamir A., Tauman Y., How to leak a secret, in: Boyd C. (Ed.), Advances in Cryptology — ASIACRYPT 2001, Springer Berlin Heidelberg, Berlin, Heidelberg, 2001, pp. 552–565.
[14]
M.D. Green, I. Miers, Forward Secure Asynchronous Messaging from Puncturable Encryption, in: 2015 IEEE Symposium on Security and Privacy, 2015, pp. 305–320, https://doi.org/10.1109/SP.2015.26.
[15]
Bellare M., Stepanovs I., Waters B., New negative results on differing-inputs obfuscation, in: Fischlin M., Coron J.-S. (Eds.), Advances in Cryptology – EUROCRYPT 2016, Springer Berlin Heidelberg, Berlin, Heidelberg, 2016, pp. 792–821.
[16]
A. Jain, Z. Jin, Indistinguishability Obfuscation via Mathematical Proofs of Equivalence, in: 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science, FOCS, 2022, pp. 1023–1034, https://doi.org/10.1109/FOCS54457.2022.00100.
[17]
Canetti R., Raghuraman S., Richelson S., Vaikuntanathan V., Chosen-ciphertext secure fully homomorphic encryption, in: Fehr S. (Ed.), Public-Key Cryptography – PKC 2017, Springer Berlin Heidelberg, Berlin, Heidelberg, 2017, pp. 213–240.
[18]
Cohen A., Holmgren J., Nishimaki R., Vaikuntanathan V., Wichs D., Watermarking cryptographic capabilities, SIAM J. Comput. 47 (6) (2018) 2157–2202,. arXiv:https://doi.org/10.1137/18M1164834.
[19]
Li X., Xu J., Fan X., Wang Y., Zhang Z., Puncturable signatures and applications in proof-of-stake blockchain protocols, IEEE Trans. Inf. Forensics Secur. 15 (2020) 3872–3885,.
[20]
Bloom B.H., Space/time trade-offs in hash coding with allowable errors, Commun. ACM 13 (1970) 422–426. URL https://api.semanticscholar.org/CorpusID:7931252.
[21]
Fan Z., Wen G., Huang Z., Zhou Y., Fu Q., Yang T., Liu A.X., Cui B., On the evolutionary of bloom filter false positives - an information theoretical approach to optimizing bloom filter parameters, IEEE Trans. Knowl. Data Eng. 35 (7) (2023) 7316–7327,.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Future Generation Computer Systems
Future Generation Computer Systems  Volume 164, Issue C
Mar 2025
595 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 March 2025

Author Tags

  1. Puncturable signature
  2. Attribute-based signature
  3. Provable security
  4. Web 3.0

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media