Abstract
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellman assumption in the random oracle model. Unfortunately, by carefully revisiting the design and security proof of Wang et al.’s scheme, we show that their scheme cannot provide unforgeability, namely, a forger, whose attributes do not satisfy a given signing predicate, can also generate valid signatures. We also point out the flaws in Wang et al.’s proof.
Similar content being viewed by others
References
Sahai A, Waters B. Fuzzy identity-based encryption. In Proc. the 24th EUROCRYPT, May 2005, pp.457–473.
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In Proc. the IEEE Symposium on Security and Privacy, May 2007, pp.321–334.
Chase M. Multi-authority attribute based encryption. In Proc. the 4th Conf. Theory of Cryptography, Feb. 2007, pp.515–534.
Chase M, Chow S. Improving privacy and security in multi-authority attribute-based encryption. In Proc. ACM Conf. Computer and Communications Security, Nov. 2009, pp.121–130.
Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Proc. the 14th Int. Conf. Practice and Theory in Public Key Cryptography, March 2011, pp.53–70.
Maji H, Prabhakaran M, Rosulek M. Attribute-based signature: Achieving attribute privacy and collusion-resistance. IACR Cryptology ePrint Archive, 2008, Article No.328.
Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Information Sciences 180(9):1681–1689
Shamir A. Identity-based cryptosystems and signature schemes. In Proc. CRYPTO 1984, Aug. 1984, pp.47–53.
Wang H, Zhu Y, Feng R, Yau S (2010) Attribute-based signature with policy-and-endorsement mechanism. Journal of Computer Science and Technology 25(6):1293–1304
Galbraith S, Paterson K, Smart N (2008) Pairing for cryptographers. Discrete Applied Mathematics 156(16):3113–3121
Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. Journal of Cryptology 13(3):361–396
Author information
Authors and Affiliations
Corresponding author
Additional information
This research was partially supported by the National High Technology Research and Development 863 Program of China under Grant No. 2011AA010803, the National Natural Science Foundation of China under Grant Nos. 61100225, 61202450, the funding of Science and Technology on Information Assurance Laboratory (KJ-13-02), and the Key Scientific and Technological Project of Henan Province of China under Grant No. 122102210126.
Electronic Supplementary Material
Below is the link to the electronic supplementary material.
Rights and permissions
About this article
Cite this article
Ge, AJ., Huang, XY., Chen, C. et al. Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism. J. Comput. Sci. Technol. 28, 743–748 (2013). https://doi.org/10.1007/s11390-013-1372-y
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11390-013-1372-y