Security analysis and improvements of certificateless aggregate signature schemes

被引:0
作者
Zhang, Yu-Lei [1 ]
Li, Chen-Yi [1 ]
Wang, Cai-Fen [1 ]
Zhang, Yong-Jie [2 ]
机构
[1] College of Computer Science and Engineering, Northwest Normal University, Lanzhou
[2] Gansu Health Vocational College, Lanzhou
来源
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | 2015年 / 37卷 / 08期
关键词
Aggregate signature; Certificateless signature; Chosen message attack; Computational Diffie-Hellman Hard problem (CDH); Cryptography; Key Generation Center (KGC) attack;
D O I
10.11999/JEIT141635
中图分类号
学科分类号
摘要
The security of certificateless signature scheme which was proposed by He et al. (2014) is analyzed, and the security of the certificateless aggregate signature scheme which was proposed by Ming et al. (2014) is analyzed too. It is pointed out that the Key Generation Center (KGC) can realize the passive attacks in the Ming's scheme. It is also pointed out that KGC can realize the passive attack and initiative attack respectively in the Nimg's scheme. The processes of concrete forgery attacks which perfored by KGC are shown, and the possible reasons are analyzed. Finally, two improved Ming's schemes are proposed. The improved schemes not only overcome the security problem of original scheme but also have an advantage that the length of aggregated signature is fixed. ©, 2015, Science Press. All right reserved.
引用
收藏
页码:1994 / 1999
页数:5
相关论文
共 14 条
[1]  
Alriyami S.S., Paterson K.G., Certificateless public key cryptography, Proceedings of the Cryptology-Asiacrypt, pp. 452-474, (2003)
[2]  
Liu J.-W., Zhang Z.-H., Chen X.-F., Certificateless remote anonymous authentication schemes for wireless body area networks, IEEE Transactions on Parallel & Distributed Systems, 25, 2, pp. 332-342, (2014)
[3]  
Guang Y., Gu C.-X., Zhu Y.-F., Et al., Certificateless fully homomorphic encryption based on LWE problem, Journal of Electronics & Information Technology, 35, 4, pp. 988-993, (2013)
[4]  
Zhang L., Wu Q.-H., Domingo-Ferrerc J., Et al., Signatures in hierarchical certificateless cryptography: efficient constructions and provable security, Information Sciences, 272, pp. 223-237, (2014)
[5]  
Boneh D., Gentry C., Lynn B., Et al., Aggregate and verifiably encrypted signatures from bilinear maps, Proceedings of the Cryptology-Eurocrypt, pp. 416-432, (2003)
[6]  
Xiong H., Guan Z., Chen Z., Et al., An efficient certificateless aggregate signature with const pairing computations, Information Sciences, 219, pp. 225-235, (2013)
[7]  
He D.-B., Tian M.-M., Chen J.-H., Insecurity of an efficient certificateless aggregate signature with constant pairing computations, Information Sciences, 268, pp. 458-462, (2014)
[8]  
Ming Y., Zhao X.-M., Wang Y.-M., Certificateless aggregate signature scheme, Journal of University of Electronic Science and Technology of China, 43, 2, pp. 188-193, (2014)
[9]  
Gong Z., Long Y., Hong X., Et al., Two certificateless aggregate signatures from bilinear maps, Proceedings of Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp. 188-193, (2007)
[10]  
Zhang L., Zhang F.-T., A new certificateless aggregation signature shceme, Computer Communications, 32, 6, pp. 1079-1085, (2009)