Security pitfalls of "ePASS: An expressive attribute-based signature scheme"

被引:3
|
作者
Wei, Jianghong [1 ]
Liu, Wenfen [1 ]
Hu, Xuexian [1 ,2 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450002, Peoples R China
[2] Sci & Technol Informat Assurance Lab, Beijing 100072, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; Attribute-based signature; Privacy; Security analysis; STANDARD MODEL; INTERNET; THINGS;
D O I
10.1016/j.jisa.2016.05.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based signature (ABS) enables a signer, who possesses a set of attributes, to anonymously sign a message with respect to some signing policy. A recipient of the signature can just ensure that a signer owing attributes that satisfy the signing policy has indeed generated the signature, without learning any information about the signer's identity or which attributes of the signer were used to produce the signature. Thus, it can be used in many fields, such as anonymous authentication, access control and trust-negotiation. Recently, Su et al. proposed an interesting ABS scheme named ePASS to deal with the problem of privacy-preserving and authentication existing in the Internet of Things. Su et al. claimed that ePASS enjoys provable security under the computational Diffie-Hellman assumption, and can preserve the signer's privacy. However, after carefully revisiting ePASS, we find that it cannot resist forgery attacks and provide attribute signer privacy, hence fails to meet the basic security definitions of the ABS system. Consequently, ePASS is not feasible for practical applications. We conclude that constructing an expressive ABS scheme from the standard Diffie-Hellman assumption is still an open problem. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:40 / 45
页数:6
相关论文
共 50 条
  • [1] ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things
    Su, Jinshu
    Cao, Dan
    Zhao, Baokang
    Wang, Xiaofeng
    You, Ilsun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 33 : 11 - 18
  • [2] On the Security of an Attribute-Based Signature Scheme
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Goi, Bok-Min
    [J]. U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2009, 62 : 161 - +
  • [3] Attribute-based signature scheme
    Guo Shaniqng
    Zeng Yingpei
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 509 - +
  • [4] EOABS: expressive outsourced attribute-based signature
    Ruo Mo
    Jianfeng Ma
    Ximeng Liu
    Hai Liu
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 979 - 988
  • [5] EOABS: expressive outsourced attribute-based signature
    Mo, Ruo
    Ma, Jianfeng
    Liu, Ximeng
    Liu, Hai
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 979 - 988
  • [6] Attribute-based proxy signature scheme with dynamic strong forward security
    Xue, Qingshui
    Lu, Zixuan
    Zhang, Tianhao
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2024, 44 (04)
  • [7] Verifiable outsourced attribute-based signature scheme
    Yanli Ren
    Tiejin Jiang
    [J]. Multimedia Tools and Applications, 2018, 77 : 18105 - 18115
  • [8] An Efficient Attribute-Based Ring Signature Scheme
    Wang Wenqiang
    Chen Shaozhen
    [J]. 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 147 - 150
  • [9] Threshold attribute-based signature and its security
    Ma, Chun-Guang
    Shi, Lan
    Zhou, Chang-Li
    Wang, Ding
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2013, 41 (05): : 1012 - 1015
  • [10] Verifiable outsourced attribute-based signature scheme
    Ren, Yanli
    Jiang, Tiejin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18105 - 18115