IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v11y2022i1p29-d1010554.html
   My bibliography  Save this article

A Delegation Attack Method on Attribute-Based Signatures and Probable Solutions

Author

Listed:
  • Jialu Hao

    (Xi’an Satellite Control Center, Xi’an 710043, China
    School of Electronic Science, National University of Defense Technology, Changsha 410073, China)

  • Wei Wu

    (Henan Key Laboratory of Network Cryptography Technology, Zhengzhou 450001, China
    State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China)

  • Shuo Wang

    (Xi’an Satellite Control Center, Xi’an 710043, China)

  • Xiaoge Zhong

    (Xi’an Satellite Control Center, Xi’an 710043, China)

  • Guang Chu

    (Xi’an Satellite Control Center, Xi’an 710043, China)

  • Feng Shao

    (Xi’an Satellite Control Center, Xi’an 710043, China)

Abstract

Attribute-based signature (ABS) assures the verifier that the message is endorsed by a signer whose attributes satisfy the claimed attribute policy (predicate); thus, it can provide identity authentication with privacy preservation in scenarios like anonymous communication and access control. However, we have found that the inherent delegatibility of attribute-based cryptography, which enables the utilization of relationship between policies, could make most of the existing ABS constructions not satisfy the unforgeability requirement under the common security model. In this paper, we dig into the delegatibility property of ABS for the first time and propose the potential delegation attack to break the unforgeability of the existing ABS constructions under the common security model. We also give two attack instances on a typical ABS construction to demonstrate the feasibility of the proposed delegation attack. Finally, we present two solutions to improve the above issue and give a further discussion about the delegatibility property of ABS.

Suggested Citation

  • Jialu Hao & Wei Wu & Shuo Wang & Xiaoge Zhong & Guang Chu & Feng Shao, 2022. "A Delegation Attack Method on Attribute-Based Signatures and Probable Solutions," Mathematics, MDPI, vol. 11(1), pages 1-14, December.
  • Handle: RePEc:gam:jmathe:v:11:y:2022:i:1:p:29-:d:1010554
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/11/1/29/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/11/1/29/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Yanyan Gu & Limin Shen & Futai Zhang & Jinbo Xiong, 2022. "Provably Secure Linearly Homomorphic Aggregate Signature Scheme for Electronic Healthcare System," Mathematics, MDPI, vol. 10(15), pages 1-14, July.
    2. Francesc Garcia-Grau & Jordi Herrera-Joancomartí & Aleix Dorca Josa, 2022. "Attribute Based Pseudonyms: Anonymous and Linkable Scoped Credentials," Mathematics, MDPI, vol. 10(15), pages 1-14, July.
    3. Eunmok Yang & Velmurugan Subbiah Parvathy & P. Pandi Selvi & K. Shankar & Changho Seo & Gyanendra Prasad Joshi & Okyeon Yi, 2020. "Privacy Preservation in Edge Consumer Electronics by Combining Anomaly Detection with Dynamic Attribute-Based Re-Encryption," Mathematics, MDPI, vol. 8(11), pages 1-13, October.
    4. P. Chinnasamy & P. Deepalakshmi & Ashit Kumar Dutta & Jinsang You & Gyanendra Prasad Joshi, 2021. "Ciphertext-Policy Attribute-Based Encryption for Cloud Storage: Toward Data Privacy and Authentication in AI-Enabled IoT System," Mathematics, MDPI, vol. 10(1), pages 1-24, December.
    5. László T. Kóczy & Dalia Susniene & Ojaras Purvinis & Márta Konczosné Szombathelyi, 2022. "A New Similarity Measure of Fuzzy Signatures with a Case Study Based on the Statistical Evaluation of Questionnaires Comparing the Influential Factors of Hungarian and Lithuanian Employee Engagement," Mathematics, MDPI, vol. 10(16), pages 1-24, August.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Adrian-Silviu Roman, 2023. "Evaluating the Privacy and Utility of Time-Series Data Perturbation Algorithms," Mathematics, MDPI, vol. 11(5), pages 1-21, March.
    2. Zizhao Xie & Jingru Sun & Yiping Tang & Xin Tang & Oluyomi Simpson & Yichuang Sun, 2023. "A K-SVD Based Compressive Sensing Method for Visual Chaotic Image Encryption," Mathematics, MDPI, vol. 11(7), pages 1-20, March.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2022:i:1:p:29-:d:1010554. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.