Security pitfalls of “ePASS: An expressive attribute-based signature scheme”
详细信息    查看全文
文摘
Attribute-based signature (ABS) enables a signer, who possesses a set of attributes, to anonymously sign a message with respect to some signing policy. A recipient of the signature can just ensure that a signer owing attributes that satisfy the signing policy has indeed generated the signature, without learning any information about the signer's identity or which attributes of the signer were used to produce the signature. Thus, it can be used in many fields, such as anonymous authentication, access control and trust-negotiation. Recently, Su et al. proposed an interesting ABS scheme named ePASS to deal with the problem of privacy-preserving and authentication existing in the Internet of Things. Su et al. claimed that ePASS enjoys provable security under the computational Diffie–Hellman assumption, and can preserve the signer's privacy. However, after carefully revisiting ePASS, we find that it cannot resist forgery attacks and provide attribute signer privacy, hence fails to meet the basic security definitions of the ABS system. Consequently, ePASS is not feasible for practical applications. We conclude that constructing an expressive ABS scheme from the standard Diffie–Hellman assumption is still an open problem.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700