浏览全部资源
扫码关注微信
1. 武汉理工大学计算机科学与技术学院,湖北 武汉 430070
2. 解放军信息工程大学,河南 郑州 450001
3. 数字工程与先进计算国家重点实验室,河南 郑州 450001
[ "杨骁(1987-),男,湖北枝江人,武汉理工大学硕士生,主要研究方向为信息安全。" ]
[ "向广利(1973-),男,河南信阳人,博士,武汉理工大学教授,主要研究方向为信息安全、移动计算、计算机网络等。" ]
[ "魏江宏(1987-),男,甘肃通渭人,博士,解放军信息工程大学讲师,主要研究方向为应用密码学、大数据安全及隐私保护、信任管理等。" ]
[ "孙瑞宗(1987-),男,辽宁丹东人,武汉理工大学硕士生,主要研究方向为信息安全。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
杨骁, 向广利, 魏江宏, 等. 对2个属性基签名方案安全性的分析和改进[J]. 通信学报, 2016,37(Z1):168-173.
Xiao YANG, Guang-li XIANG, Jiang-hong WEI, et al. Security analysis and improvement of two attribute-based signature schemes[J]. Journal on communications, 2016, 37(Z1): 168-173.
杨骁, 向广利, 魏江宏, 等. 对2个属性基签名方案安全性的分析和改进[J]. 通信学报, 2016,37(Z1):168-173. DOI: 10.11959/j.issn.1000-436x.2016263.
Xiao YANG, Guang-li XIANG, Jiang-hong WEI, et al. Security analysis and improvement of two attribute-based signature schemes[J]. Journal on communications, 2016, 37(Z1): 168-173. DOI: 10.11959/j.issn.1000-436x.2016263.
为了克服已有属性基签名机制在安全性、效率和签名策略上的缺陷,Ma等和Cao等分别提出了一个单属性机构环境下的门限属性基签名体制和多属性机构环境下签名策略支持属性的与、或、门限操作的属性基签名体制,并在计算性Diffie-Hellman假设下给出了相应体制的安全性证明。通过给出具体的攻击方法,指出这2个属性基签名方案都是不安全的,均不能抵抗伪造攻击,无法在实际中应用。此外,分析了这2个方案不安全的原因,并给出了针对Ma等方案的一种改进措施。
In order to overcome the drawbacks of current attribute-based signature (ABS) schemes in terms of security
efficiency and signing policy
Ma
et al.and Cao
et al.respectively proposed a threshold ABS with single attribute au-thority and a multi-authority ABS with signing policy supporting AND
OR
threshold gates
and presented the security proof of their schemes under computational Diffie-Hellman assumption.Both schemes were demonstrated have security pitfalls by presenting specified attacks against them.Specifically
their schemes are all vulnerable to forgery attack.Thus
they are not feasible for practical applications.In addition
the cause of the flaws in these ABS schemes are presented
as well as an improvement of Ma et al.'s scheme.
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]//Advances in Cryptology-Eurocrypt 2005 . 2005 : 457 - 473 .
OKAMOTO T , TAKASHIMA K . Efficient attribute-based signatures for non-monotone predicates in the standard model [J ] . IEEE Transac-tions on Cloud Computing , 2014 , 2 ( 4 ): 409 - 421 .
CHEN T , LI J , HUANG X , et al . Secure outsourced attribute-based signatures [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 12 ): 3285 - 3294 .
WEI J , HUANG X , HU X , et al . Revocable threshold attribute-based signature against signing key exposure[C]//ISPEC 2015 . 2015 : 316 - 330 .
WEI J , HU X , LIU W . Traceable attribute-based signcryption [J ] . Secu-rity and Communication Networks , 2014 , 7 ( 12 ): 2302 - 2317 .
杨晓元 , 林志强 , 韩益亮 . 高效的模糊属性基签密方案 [J ] . 通信学报 , 2013 , 34 ( Z1 ): 8 - 13 .
YANG X Y , LIN Z Q , HAN Y L . Efficient fuzzy attribute-based sign-cryption scheme [J ] . Journal on Communications , 2013 , 34 ( Z1 ): 8 - 13 .
MAJI H , PRABHAKARAN M , ROSULEK M . Attribute-based sig-natures:achieving attribute-privacy and collusion-resistance [EB/OL ] . http://eprint.i acr.org/2008/328 http://eprint.i acr.org/2008/328 , 2008 .
KUMAR S , AGRAWAL S , BALARAMAN S , et al . Attribute based signatures for bounded multi-level threshold circuits[C]//EuroPKI 2010 . 2011 : 141 - 154 .
LI J , AU M , SUSILO W , XIE D , et al . Attribute-based signature and its applications[C]//The 5th ACM Symposium on Information,Computer and Communications Security-ASIACCS'10 . New York , 2010 : 60 - 69 .
LI J , KIM K . Hidden attribute-based signatures without anonymity revocation [J ] . Information Sciences , 2010 , 180 ( 9 ): 1681 - 1689 .
SHAHANDASHTI S , SAFAVI N . Threshold attribute-based signa-tures and their application to anonymous credential sys-tems[C]//Progress in Cryptology-AFRICACRYPT 2009 . 2009 : 198 - 216 .
MAJI H , PRABHAKARAN M , ROSULEK M . Attribute-based signa-tures[C]//CT-RSA 2011 . 2011 : 376 - 392 .
OKAMOTO T , TAKASHIMA K . Efficient attribute-based signatures for non-monotone predicates in the standard model[C]//Public Key Cryptography-PKC 2011 . 2011 : 35 - 52 .
CAO D , WANG X , WANGT , SU J . An expressive attribute-based signature scheme without random oracles[C]//2011 International Con-ference on Computer Application and System Modeling (ICCASM2011) . 2011 : 560 - 564 .
ESCALA A , HERRANZ J , MORILLO P . Revocable attribute-based signatures with adaptive security in the standard model[C]//Proceed-ings of the 4th International Conference on Progress in Cryptology in Africa (AFRICACRYPT'11) . 2011 : 224 - 241 .
WEI J , LIU W , HU X . Forward-secure threshold attribute-based sig-nature scheme [J ] . The Computer Journal , 2015 , 58 ( 10 ): 2492 - 2506 .
GHADAFI E . Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions[C]//CT-RSA 2015 . 2015 : 391 - 409 .
马春光 , 石岚 , 周长利 , 等 . 属性基门限签名方案及其安全性研究 [J ] . 电子学报 , 2013 , 41 ( 5 ): 1012 - 1015 .
MA C G , SHI L , ZHOU C L , et al . Threshold attribute-based signature and its security [J ] . Acta Electronic Sinica , 2013 , 41 ( 5 ): 1012 - 1015 .
CAO D , ZHAO B , WANG X , et al . Flexible multi-authority attrib-ute-based signature schemes for expressive policy [J ] . Mobile Informa-tion Systems , 2012 , 8 ( 3 ): 255 - 274 .
0
浏览量
578
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构