• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science ›› 2023, Vol. 45 ›› Issue (02): 269-276.

• Computer Network and Znformation Security • Previous Articles     Next Articles

An identity-based auditable multiple interception signature scheme

HE Qi-zhi1,CAO Su-zhen1,WANG Cai-fen1,2,LU Yan-fei1,FANG Zi-xuan1,YAN Jun-jian1   

  1. (1.College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070;
    2.College of Big Data and Internet,Shenzhen University of Technology,Shenzhen 518118,China)
  • Received:2021-12-14 Revised:2022-06-09 Accepted:2023-02-25 Online:2023-02-25 Published:2023-02-15

Abstract: To solve the problems of malicious user revisions in content extraction signatures and untraceability of signatures after extraction, an auditable extraction signature scheme is proposed under the identity-based cryptosystem. The scheme adopts a generic model of M-tree to realize hier-archical multiple extraction signatures, and achieves auditability of signatures by backtracking the tree structure to achieve the purpose of extractor auditable questioning rights. Under the random oracle model, based on the discrete logarithmic difficulty problem, it is proved to be resistant to existential forgery under the adaptive selection message attack . The analysis of experimental results shows that the proposed scheme has certain computational advantages in the signature and extraction phases and the signature verification phase.

Key words: multi-signature, interception signature, auditability, random oracle model, adaptability chosen based message attack