Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model

被引:19
作者
Shen, Limin [1 ,2 ,3 ]
Ma, Jianfeng [2 ,3 ]
Miao, Yinbin [3 ]
Liu, Hai [3 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
[3] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
CRYPTANALYSIS;
D O I
10.1049/iet-ifs.2018.5226
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An aggregate signature (AS) scheme combines multiple signatures which is generated by many different users into a single one. This feature is very beneficial for diminishing storage cost, bandwidth and verification cost. Many previous attempts have been made for designing AS schemes, while the former security models have not clearly addressed coalition attacks, and most of the existing AS schemes cannot resist these kinds of attacks. In this study, the authors provide a modified security model of certificateless AS (CLAS) schemes and then give a new CLAS scheme. The security of their present scheme can be rigorously proved based on the computational Diffie-Hellman assumption in the random oracle model. Furthermore, their scheme can resist such coalition attacks, i.e. an AS in their scheme is valid iff all single signatures used to generate the AS are valid.
引用
收藏
页码:167 / 173
页数:7
相关论文
共 39 条
  • [31] Cryptanalysis of a forward secure blind signature scheme with provable security
    Wang, SH
    Bao, F
    Deng, RH
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 53 - 60
  • [32] On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
    He, Jun
    Yang, Zheng
    Zhang, Jianxun
    Liu, Wanping
    Liu, Chao
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (01):
  • [33] An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (01) : 1 - 20
  • [34] More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters for Standardized Elliptic Curves
    Takemure, Kaoru
    Sakai, Yusuke
    Santoso, Bagus
    Hanaoka, Goichiro
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (07) : 966 - 988
  • [35] An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things
    Qiao, Zirui
    Yang, Qiliang
    Zhou, Yanwei
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    Wang, Tao
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 72 - 82
  • [36] Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision
    Abbasinezhad-Mood, Dariush
    Mazinani, Sayyed Majid
    Nikooghadam, Morteza
    Ostad-Sharif, Arezou
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1227 - 1238
  • [37] The security analysis of forward-secure group blind signature scheme based on the Chinese remainder theorem
    Wei, Gao
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5644 - 5647
  • [38] Certificateless Anonymous Signcryption Scheme With Provable Security in the Standard Model Suitable for Healthcare Wireless Sensor Networks
    Deng, Lunzhi
    Wang, Bo
    Gao, Yan
    Chen, Zhiwei
    Li, Siwei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18): : 15953 - 15965
  • [39] Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
    Xie, Qi
    Wong, Duncan S.
    Wang, Guilin
    Tan, Xiao
    Chen, Kefei
    Fang, Liming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (06) : 1382 - 1392