Part of the book series:Lecture Notes in Computer Science ((LNSC,volume 7873))
Included in the following conference series:
3819Accesses
Abstract
In CT-RSA 2011, Maji et.al proposed an attribute-based signature (ABS) scheme, which is the most efficient ABS scheme that supports general predicates until now. They claimed that their ABS scheme is unforgeable under generic group model. Unfortunately, we found a forgery attack on this ABS scheme. In this paper, we firstly give a forgery example, then analyze the reason cause this attack and gives the conditions this attack worked. We found this attack is fatal to Maji et.al’s ABS scheme.
Supported by the National Natural Science Foundation of China under Grant Nos. 60803129, 91118006; The National High-Tech Research and Development Plan of China under Grant Nos. 2011AA01A203, 2012AA01A403; The National Basic Research Program of China under Grant No. 2013CB338003.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 5719
- Price includes VAT (Japan)
- Softcover Book
- JPY 7149
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Maji, H., Prabhakaran, M., Rosulek, M.: Attribute-based signatures: Achieving attribute privacy and collusion-resistance. Technical Report, Cryptology ePrint Archive, Report 2008/328 (2008),http://eprint.iacr.org/2008/328
Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376–392. Springer, Heidelberg (2011)
Escala, A., Herranz, J., Morillo, P.: Revocable attribute-based signatures with adaptive security in the standard model. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 224–241. Springer, Heidelberg (2011)
Okamoto, T., Takashima, K.: Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 35–52. Springer, Heidelberg (2011)
Okamoto, T., Takashima, K.: Decentralized attribute-based signatures. Technical Report, Cryptology ePrint Archive, Report 2011/701 (2011),http://eprint.iacr.org/2011/701
Li, J., Kim, K.: Attribute-Based Ring Signatures. Technical Report, Cryptology ePrint Archive, Report 2008/394 (2008),http://eprint.iacr.org/2008/394
Li, J., Au, M., Susio, W., Xie, D., Ren, R.: Attribute-based signature and its applications. In: ASIACCS 2010, pp. 60–69 (2010)
Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 198–216. Springer, Heidelberg (2009)
Herranz, J., Laguillaumie, F., Libert, B., Ràfols, C.: Short attribute-based signatures for threshold predicates. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 51–67. Springer, Heidelberg (2012)
Boyen, X.: Mesh signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 210–227. Springer, Heidelberg (2007)
Groth, J., Sahai, A.: Efficient Non-interactive Proof Systems for Bilinear Groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415–432. Springer, Heidelberg (2008)
Author information
Authors and Affiliations
Institute of Software, Chinese Academy of Sciences, Beijing, China
Yan Zhang, Dengguo Feng, Zhengfeng Zhang & Liwu Zhang
- Yan Zhang
You can also search for this author inPubMed Google Scholar
- Dengguo Feng
You can also search for this author inPubMed Google Scholar
- Zhengfeng Zhang
You can also search for this author inPubMed Google Scholar
- Liwu Zhang
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
Computer Science Department, ETSI Informatica, University of Malaga, Campus de Teatinos, 29071, Malaga, Spain
Javier Lopez
School of Mathematics and Computer Science, Fujian Normal University, No. 32 Shangsan Road, 350007, Fuzhou, China
Xinyi Huang
Institute for Cyber Security,, University of Texas at San Antonio, One UTSA Circle, 78249, San Antonio, TX, USA
Ravi Sandhu
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, Y., Feng, D., Zhang, Z., Zhang, L. (2013). On the Security of an Efficient Attribute-Based Signature. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_28
Download citation
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-642-38630-5
Online ISBN:978-3-642-38631-2
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative