On the Security of an Efficient Attribute-Based Signature
详细信息    查看全文
  • 作者:Yan Zhang (19)
    Dengguo Feng (19)
    Zhengfeng Zhang (19)
    Liwu Zhang (19)
  • 关键词:Attribute ; based ; signature ; cryptoanalysis
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2013
  • 出版时间:2013
  • 年:2013
  • 卷:7873
  • 期:1
  • 页码:393-404
  • 全文大小:243KB
  • 参考文献:1. Maji, H., Prabhakaran, M., Rosulek, M.: Attribute-based signatures: Achieving attribute privacy and collusion-resistance. Technical Report, Cryptology ePrint Archive, Report 2008/328 (2008), http://eprint.iacr.org/2008/328
    2. Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol.?6558, pp. 376-92. Springer, Heidelberg (2011) CrossRef
    3. Escala, A., Herranz, J., Morillo, P.: Revocable attribute-based signatures with adaptive security in the standard model. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol.?6737, pp. 224-41. Springer, Heidelberg (2011) CrossRef
    4. Okamoto, T., Takashima, K.: Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol.?6571, pp. 35-2. Springer, Heidelberg (2011) CrossRef
    5. Okamoto, T., Takashima, K.: Decentralized attribute-based signatures. Technical Report, Cryptology ePrint Archive, Report 2011/701 (2011), http://eprint.iacr.org/2011/701
    6. Li, J., Kim, K.: Attribute-Based Ring Signatures. Technical Report, Cryptology ePrint Archive, Report 2008/394 (2008), http://eprint.iacr.org/2008/394
    7. Li, J., Au, M., Susio, W., Xie, D., Ren, R.: Attribute-based signature and its applications. In: ASIACCS 2010, pp. 60-9 (2010)
    8. Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol.?5580, pp. 198-16. Springer, Heidelberg (2009) CrossRef
    9. Herranz, J., Laguillaumie, F., Libert, B., Ràfols, C.: Short attribute-based signatures for threshold predicates. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol.?7178, pp. 51-7. Springer, Heidelberg (2012) CrossRef
    10. Boyen, X.: Mesh signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.?4515, pp. 210-27. Springer, Heidelberg (2007) CrossRef
    11. Groth, J., Sahai, A.: Efficient Non-interactive Proof Systems for Bilinear Groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.?4965, pp. 415-32. Springer, Heidelberg (2008) CrossRef
  • 作者单位:Yan Zhang (19)
    Dengguo Feng (19)
    Zhengfeng Zhang (19)
    Liwu Zhang (19)

    19. Institute of Software, Chinese Academy of Sciences, Beijing, China
  • ISSN:1611-3349
文摘
In CT-RSA 2011, Maji et.al proposed an attribute-based signature (ABS) scheme, which is the most efficient ABS scheme that supports general predicates until now. They claimed that their ABS scheme is unforgeable under generic group model. Unfortunately, we found a forgery attack on this ABS scheme. In this paper, we firstly give a forgery example, then analyze the reason cause this attack and gives the conditions this attack worked. We found this attack is fatal to Maji et.al’s ABS scheme.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700