Skip to main content
Log in

Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism

  • Short Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellman assumption in the random oracle model. Unfortunately, by carefully revisiting the design and security proof of Wang et al.’s scheme, we show that their scheme cannot provide unforgeability, namely, a forger, whose attributes do not satisfy a given signing predicate, can also generate valid signatures. We also point out the flaws in Wang et al.’s proof.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Sahai A, Waters B. Fuzzy identity-based encryption. In Proc. the 24th EUROCRYPT, May 2005, pp.457–473.

  2. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In Proc. the IEEE Symposium on Security and Privacy, May 2007, pp.321–334.

  3. Chase M. Multi-authority attribute based encryption. In Proc. the 4th Conf. Theory of Cryptography, Feb. 2007, pp.515–534.

  4. Chase M, Chow S. Improving privacy and security in multi-authority attribute-based encryption. In Proc. ACM Conf. Computer and Communications Security, Nov. 2009, pp.121–130.

  5. Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Proc. the 14th Int. Conf. Practice and Theory in Public Key Cryptography, March 2011, pp.53–70.

  6. Maji H, Prabhakaran M, Rosulek M. Attribute-based signature: Achieving attribute privacy and collusion-resistance. IACR Cryptology ePrint Archive, 2008, Article No.328.

  7. Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Information Sciences 180(9):1681–1689

    Article  MathSciNet  MATH  Google Scholar 

  8. Shamir A. Identity-based cryptosystems and signature schemes. In Proc. CRYPTO 1984, Aug. 1984, pp.47–53.

  9. Wang H, Zhu Y, Feng R, Yau S (2010) Attribute-based signature with policy-and-endorsement mechanism. Journal of Computer Science and Technology 25(6):1293–1304

    Article  MathSciNet  Google Scholar 

  10. Galbraith S, Paterson K, Smart N (2008) Pairing for cryptographers. Discrete Applied Mathematics 156(16):3113–3121

    Article  MathSciNet  MATH  Google Scholar 

  11. Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. Journal of Cryptology 13(3):361–396

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuan-Gui Ma.

Additional information

This research was partially supported by the National High Technology Research and Development 863 Program of China under Grant No. 2011AA010803, the National Natural Science Foundation of China under Grant Nos. 61100225, 61202450, the funding of Science and Technology on Information Assurance Laboratory (KJ-13-02), and the Key Scientific and Technological Project of Henan Province of China under Grant No. 122102210126.

Electronic Supplementary Material

Below is the link to the electronic supplementary material.

(DOC 36.5 KB)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ge, AJ., Huang, XY., Chen, C. et al. Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism. J. Comput. Sci. Technol. 28, 743–748 (2013). https://doi.org/10.1007/s11390-013-1372-y

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-013-1372-y

Keywords

Navigation