Abstract
Ren and Jiang recently published a “verifiable outsourced attribute-based signature scheme” in Multimedia Tools and Applications. In this note, we first provide two attacks on the verifiability of the semi-signatures of this scheme by showing that a malicious signing-cloud service provider (S-CSP) can always cheat the signer unlike the authors’ claim. Moreover, one of these attacks also implies that an untrusted S-CSP can always forge signatures contrary to the claimed unforgeability against chosen message attacks. Therefore, this scheme unfortunately does not satisfy the main security properties for a delegated signature scheme.
Zitieren
Uzunkol O. Comments on “verifiable outsourced attribute-based signature scheme”. Multimedia Tools and Applications . 2019;78(9):11735-11742, . doi:10.1007/s11042-018-6725-7.
(2019). Comments on “verifiable outsourced attribute-based signature scheme”. Multimedia Tools And Applications , 78(9), 11735-11742, . http://doi.org/10.1007/s11042-018-6725-7 (Original work published 2019/05/01)
. Uzunkol, Osmanbey. (2019/05/01) 2019. „Comments On “Verifiable Outsourced Attribute-Based Signature Scheme”“. Multimedia Tools And Applications 78 (9): 11735-11742, . doi:10.1007/s11042-018-6725-7.
Uzunkol, Osmanbey. „Comments On “Verifiable Outsourced Attribute-Based Signature Scheme”“. Multimedia Tools and Applications 78.9 (2019): 11735-11742, .
„Comments On “Verifiable Outsourced Attribute-Based Signature Scheme”“. 2019/05/01. Multimedia Tools And Applications , 2019, S. 11735-11742, .
. Details
-
Date Published
2019/05/01 -
Volume
78 -
Number of Pages
11735-11742, -
ISBN Number
1573-7721 -
URL
https://doi.org/10.1007/s11042-018-6725-7