Comments on “verifiable outsourced attribute-based signature scheme”

被引:0
|
作者
Osmanbey Uzunkol
机构
[1] FernUniversität in Hagen,Faculty of Mathematics and Computer Science
来源
关键词
Cloud computing; Lightweight cryptography; Attribute-based signatures; Delegated algorithms; Verifiability;
D O I
暂无
中图分类号
学科分类号
摘要
Ren and Jiang recently published a “verifiable outsourced attribute-based signature scheme” in Multimedia Tools and Applications. In this note, we first provide two attacks on the verifiability of the semi-signatures of this scheme by showing that a malicious signing-cloud service provider (S-CSP) can always cheat the signer unlike the authors’ claim. Moreover, one of these attacks also implies that an untrusted S-CSP can always forge signatures contrary to the claimed unforgeability against chosen message attacks. Therefore, this scheme unfortunately does not satisfy the main security properties for a delegated signature scheme.
引用
收藏
页码:11735 / 11742
页数:7
相关论文
共 50 条
  • [1] Comments on "verifiable outsourced attribute-based signature scheme"
    Uzunkol, Osmanbey
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (09) : 11735 - 11742
  • [2] Verifiable outsourced attribute-based signature scheme
    Yanli Ren
    Tiejin Jiang
    [J]. Multimedia Tools and Applications, 2018, 77 : 18105 - 18115
  • [3] Verifiable outsourced attribute-based signature scheme
    Ren, Yanli
    Jiang, Tiejin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18105 - 18115
  • [4] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [5] Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    Hue, Li
    Pan, Bianjing
    Liu, Kai
    Mao, Xiaohang
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 552 - 566
  • [6] Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lin, Suqing
    Zhang, Rui
    Ma, Hui
    Wang, Mingsheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2119 - 2130
  • [7] Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
    Qin, Baodong
    Deng, Robert H.
    Liu, Shengli
    Ma, Siqi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1384 - 1393
  • [8] Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing"
    Xiong, Hu
    Sun, Jianfei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (04) : 461 - 462
  • [9] EOABS: expressive outsourced attribute-based signature
    Ruo Mo
    Jianfeng Ma
    Ximeng Liu
    Hai Liu
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 979 - 988
  • [10] EOABS: expressive outsourced attribute-based signature
    Mo, Ruo
    Ma, Jianfeng
    Liu, Ximeng
    Liu, Hai
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 979 - 988