An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps

被引:1
作者
Kumar, Pankaj [1 ]
Sharma, Vishnu [2 ]
Sharma, Gaurav [3 ]
Bhatia, Tarunpreet [4 ]
机构
[1] Galgotias Univ, Sch Comp Sci & Engn, Delhi, India
[2] Amity Univ, Amity Sch Engn, Noida, India
[3] Univ Libre Bruxelles, Dept Informat, Brussels, Belgium
[4] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala, Punjab, India
关键词
Certificateless Signature; Cryptanalysis; Cryptography; Digital Signature;
D O I
10.4018/IJISP.2019100106
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Certificateless signature schemes are a very intriguing aspect in information security because of its capability of removing the well-known key escrow problem predominately in ID-based cryptography. He et al. proposed an efficient certificateless aggregate signature scheme and proved that their scheme is secure against all possible types of security attacks. However, the authors still managed to find loopholes in the form of insecurities against 'honest but curious' and 'malicious but passive' attacks during cryptanalysis of He et al.'s scheme. The authors propose an efficient certificateless aggregate signature scheme which fills the security gaps in He et al.'s scheme and demonstrate the security in their scheme via a mathematical proof, and reinforce the fact that their scheme is much more efficient in a thorough performance comparison of their scheme against the previous schemes.
引用
收藏
页码:89 / 108
页数:20
相关论文
共 23 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
[Anonymous], 2006, IACR CRYPTOLOGY EPRI
[3]  
Au M. H., 2007, PROC ACM S INF COMP, P302
[4]  
BONEH D, 2003, THEORY APPL CRYPTOGR, V2656, P416, DOI DOI 10.1007/3-540-39200-9_26
[5]  
Castro R., 2007, Cryptol. ePrint Arch
[6]   Cryptanalysis and improvement of a certificateless aggregate signature scheme [J].
Cheng, Lin ;
Wen, Qiaoyan ;
Jin, Zhengping ;
Zhang, Hua ;
Zhou, Liming .
INFORMATION SCIENCES, 2015, 295 :337-346
[7]   Two certificateless aggregate signatures from bilinear maps [J].
Gong, Zheng ;
Long, Yu ;
Hong, Xuan ;
Chen, Kefei .
SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, :188-+
[8]  
Gorantla MC, 2005, LECT NOTES ARTIF INT, V3802, P110
[9]   Insecurity of an efficient certificateless aggregate signature with constant pairing computations [J].
He, Debiao ;
Tian, Miaomiao ;
Chen, Jianhua .
INFORMATION SCIENCES, 2014, 268 :458-462
[10]  
Huang XY, 2007, LECT NOTES COMPUT SC, V4586, P308