Xiao YANG, Guang-li XIANG, Jiang-hong WEI, et al. Security analysis and improvement of two attribute-based signature schemes[J]. Journal on Communications, 2016, 37(Z1): 168-173.
DOI:
Xiao YANG, Guang-li XIANG, Jiang-hong WEI, et al. Security analysis and improvement of two attribute-based signature schemes[J]. Journal on Communications, 2016, 37(Z1): 168-173. DOI: 10.11959/j.issn.1000-436x.2016263.
Security analysis and improvement of two attribute-based signature schemes
In order to overcome the drawbacks of current attribute-based signature (ABS) schemes in terms of security
efficiency and signing policy
Ma
et al.and Cao
et al.respectively proposed a threshold ABS with single attribute au-thority and a multi-authority ABS with signing policy supporting AND
OR
threshold gates
and presented the security proof of their schemes under computational Diffie-Hellman assumption.Both schemes were demonstrated have security pitfalls by presenting specified attacks against them.Specifically
their schemes are all vulnerable to forgery attack.Thus
they are not feasible for practical applications.In addition
the cause of the flaws in these ABS schemes are presented
as well as an improvement of Ma et al.'s scheme.
关键词
Keywords
references
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]//Advances in Cryptology-Eurocrypt 2005 . 2005 : 457 - 473 .
OKAMOTO T , TAKASHIMA K . Efficient attribute-based signatures for non-monotone predicates in the standard model [J ] . IEEE Transac-tions on Cloud Computing , 2014 , 2 ( 4 ): 409 - 421 .
CHEN T , LI J , HUANG X , et al . Secure outsourced attribute-based signatures [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 12 ): 3285 - 3294 .
WEI J , HUANG X , HU X , et al . Revocable threshold attribute-based signature against signing key exposure[C]//ISPEC 2015 . 2015 : 316 - 330 .
WEI J , HU X , LIU W . Traceable attribute-based signcryption [J ] . Secu-rity and Communication Networks , 2014 , 7 ( 12 ): 2302 - 2317 .
YANG X Y , LIN Z Q , HAN Y L . Efficient fuzzy attribute-based sign-cryption scheme [J ] . Journal on Communications , 2013 , 34 ( Z1 ): 8 - 13 .
MAJI H , PRABHAKARAN M , ROSULEK M . Attribute-based sig-natures:achieving attribute-privacy and collusion-resistance [EB/OL ] . http://eprint.i acr.org/2008/328 http://eprint.i acr.org/2008/328 , 2008 .
KUMAR S , AGRAWAL S , BALARAMAN S , et al . Attribute based signatures for bounded multi-level threshold circuits[C]//EuroPKI 2010 . 2011 : 141 - 154 .
LI J , AU M , SUSILO W , XIE D , et al . Attribute-based signature and its applications[C]//The 5th ACM Symposium on Information,Computer and Communications Security-ASIACCS'10 . New York , 2010 : 60 - 69 .
LI J , KIM K . Hidden attribute-based signatures without anonymity revocation [J ] . Information Sciences , 2010 , 180 ( 9 ): 1681 - 1689 .
SHAHANDASHTI S , SAFAVI N . Threshold attribute-based signa-tures and their application to anonymous credential sys-tems[C]//Progress in Cryptology-AFRICACRYPT 2009 . 2009 : 198 - 216 .
MAJI H , PRABHAKARAN M , ROSULEK M . Attribute-based signa-tures[C]//CT-RSA 2011 . 2011 : 376 - 392 .
OKAMOTO T , TAKASHIMA K . Efficient attribute-based signatures for non-monotone predicates in the standard model[C]//Public Key Cryptography-PKC 2011 . 2011 : 35 - 52 .
CAO D , WANG X , WANGT , SU J . An expressive attribute-based signature scheme without random oracles[C]//2011 International Con-ference on Computer Application and System Modeling (ICCASM2011) . 2011 : 560 - 564 .
ESCALA A , HERRANZ J , MORILLO P . Revocable attribute-based signatures with adaptive security in the standard model[C]//Proceed-ings of the 4th International Conference on Progress in Cryptology in Africa (AFRICACRYPT'11) . 2011 : 224 - 241 .
WEI J , LIU W , HU X . Forward-secure threshold attribute-based sig-nature scheme [J ] . The Computer Journal , 2015 , 58 ( 10 ): 2492 - 2506 .
GHADAFI E . Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions[C]//CT-RSA 2015 . 2015 : 391 - 409 .
MA C G , SHI L , ZHOU C L , et al . Threshold attribute-based signature and its security [J ] . Acta Electronic Sinica , 2013 , 41 ( 5 ): 1012 - 1015 .
CAO D , ZHAO B , WANG X , et al . Flexible multi-authority attrib-ute-based signature schemes for expressive policy [J ] . Mobile Informa-tion Systems , 2012 , 8 ( 3 ): 255 - 274 .