{"title":"基于图的数据系统通用指定验证者传递签名证明方案","authors":"Yucan Xu, Qixin Wang, Yufei Ren, Ying Hu, Fei Zhu, Wei Wu, Shaojun Yang","doi":"10.1002/cpe.70295","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Transitive signatures are a special type of homomorphic signature proposed by Turing Award winners Micali and Rivest, which are highly suitable for authenticating dynamically growing graph-based data systems. In such a signature scheme, anyone with the signer's public key is allowed to generate a signature for a composed edge <span></span><math>\n <semantics>\n <mrow>\n <mo>(</mo>\n <mi>i</mi>\n <mo>,</mo>\n <mi>k</mi>\n <mo>)</mo>\n </mrow>\n <annotation>$$ \\left(i,k\\right) $$</annotation>\n </semantics></math>, from two signatures on adjacent edges <span></span><math>\n <semantics>\n <mrow>\n <mo>(</mo>\n <mi>i</mi>\n <mo>,</mo>\n <mi>j</mi>\n <mo>)</mo>\n </mrow>\n <annotation>$$ \\left(i,j\\right) $$</annotation>\n </semantics></math> and <span></span><math>\n <semantics>\n <mrow>\n <mo>(</mo>\n <mi>j</mi>\n <mo>,</mo>\n <mi>k</mi>\n <mo>)</mo>\n </mrow>\n <annotation>$$ \\left(j,k\\right) $$</annotation>\n </semantics></math>. To prevent the problem of malicious dissemination of signatures by verifiers leading to data privacy leakage, researchers have proposed a series of universal designated verifier transitive signature (UDVTS) schemes. However, existing work requires that the designated verifier create its own secret-public key pair using the public key parameters provided by the signer. Besides, these schemes suffer from significant performance defects due to expensive pairing or exponentiation operations. In this work, we design a pairing-free and exponentiation-free UDVTS proof scheme based on the SM2 digital signature algorithm and a zero-knowledge proof scheme. We prove the security of our construction based on rigorous cryptographic assumptions. The performance comparison with related work shows that our UDVTS proof scheme has an optimal computational cost and desirable communication cost. For example, compared to the state-of-the-art work, we reduce the signing cost by <span></span><math>\n <semantics>\n <mrow>\n <mn>70</mn>\n <mo>.</mo>\n <mn>54</mn>\n <mo>%</mo>\n </mrow>\n <annotation>$$ 70.54\\% $$</annotation>\n </semantics></math> and the designated verification cost by <span></span><math>\n <semantics>\n <mrow>\n <mn>96</mn>\n <mo>.</mo>\n <mn>05</mn>\n <mo>%</mo>\n </mrow>\n <annotation>$$ 96.05\\% $$</annotation>\n </semantics></math>.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 23-24","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Practical Universal Designated Verifier Transitive Signature Proof Scheme for Graph-Based Data Systems\",\"authors\":\"Yucan Xu, Qixin Wang, Yufei Ren, Ying Hu, Fei Zhu, Wei Wu, Shaojun Yang\",\"doi\":\"10.1002/cpe.70295\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>Transitive signatures are a special type of homomorphic signature proposed by Turing Award winners Micali and Rivest, which are highly suitable for authenticating dynamically growing graph-based data systems. In such a signature scheme, anyone with the signer's public key is allowed to generate a signature for a composed edge <span></span><math>\\n <semantics>\\n <mrow>\\n <mo>(</mo>\\n <mi>i</mi>\\n <mo>,</mo>\\n <mi>k</mi>\\n <mo>)</mo>\\n </mrow>\\n <annotation>$$ \\\\left(i,k\\\\right) $$</annotation>\\n </semantics></math>, from two signatures on adjacent edges <span></span><math>\\n <semantics>\\n <mrow>\\n <mo>(</mo>\\n <mi>i</mi>\\n <mo>,</mo>\\n <mi>j</mi>\\n <mo>)</mo>\\n </mrow>\\n <annotation>$$ \\\\left(i,j\\\\right) $$</annotation>\\n </semantics></math> and <span></span><math>\\n <semantics>\\n <mrow>\\n <mo>(</mo>\\n <mi>j</mi>\\n <mo>,</mo>\\n <mi>k</mi>\\n <mo>)</mo>\\n </mrow>\\n <annotation>$$ \\\\left(j,k\\\\right) $$</annotation>\\n </semantics></math>. To prevent the problem of malicious dissemination of signatures by verifiers leading to data privacy leakage, researchers have proposed a series of universal designated verifier transitive signature (UDVTS) schemes. However, existing work requires that the designated verifier create its own secret-public key pair using the public key parameters provided by the signer. Besides, these schemes suffer from significant performance defects due to expensive pairing or exponentiation operations. In this work, we design a pairing-free and exponentiation-free UDVTS proof scheme based on the SM2 digital signature algorithm and a zero-knowledge proof scheme. We prove the security of our construction based on rigorous cryptographic assumptions. The performance comparison with related work shows that our UDVTS proof scheme has an optimal computational cost and desirable communication cost. For example, compared to the state-of-the-art work, we reduce the signing cost by <span></span><math>\\n <semantics>\\n <mrow>\\n <mn>70</mn>\\n <mo>.</mo>\\n <mn>54</mn>\\n <mo>%</mo>\\n </mrow>\\n <annotation>$$ 70.54\\\\% $$</annotation>\\n </semantics></math> and the designated verification cost by <span></span><math>\\n <semantics>\\n <mrow>\\n <mn>96</mn>\\n <mo>.</mo>\\n <mn>05</mn>\\n <mo>%</mo>\\n </mrow>\\n <annotation>$$ 96.05\\\\% $$</annotation>\\n </semantics></math>.</p>\\n </div>\",\"PeriodicalId\":55214,\"journal\":{\"name\":\"Concurrency and Computation-Practice & Experience\",\"volume\":\"37 23-24\",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2025-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Concurrency and Computation-Practice & Experience\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70295\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70295","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
Practical Universal Designated Verifier Transitive Signature Proof Scheme for Graph-Based Data Systems
Transitive signatures are a special type of homomorphic signature proposed by Turing Award winners Micali and Rivest, which are highly suitable for authenticating dynamically growing graph-based data systems. In such a signature scheme, anyone with the signer's public key is allowed to generate a signature for a composed edge , from two signatures on adjacent edges and . To prevent the problem of malicious dissemination of signatures by verifiers leading to data privacy leakage, researchers have proposed a series of universal designated verifier transitive signature (UDVTS) schemes. However, existing work requires that the designated verifier create its own secret-public key pair using the public key parameters provided by the signer. Besides, these schemes suffer from significant performance defects due to expensive pairing or exponentiation operations. In this work, we design a pairing-free and exponentiation-free UDVTS proof scheme based on the SM2 digital signature algorithm and a zero-knowledge proof scheme. We prove the security of our construction based on rigorous cryptographic assumptions. The performance comparison with related work shows that our UDVTS proof scheme has an optimal computational cost and desirable communication cost. For example, compared to the state-of-the-art work, we reduce the signing cost by and the designated verification cost by .
期刊介绍:
Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of:
Parallel and distributed computing;
High-performance computing;
Computational and data science;
Artificial intelligence and machine learning;
Big data applications, algorithms, and systems;
Network science;
Ontologies and semantics;
Security and privacy;
Cloud/edge/fog computing;
Green computing; and
Quantum computing.