Fault-Tolerant Aggregate Signatures

被引:37
作者
Hartung, Gunnar [1 ]
Kaidel, Bjoern [1 ]
Koch, Alexander [1 ]
Koch, Jessica [1 ]
Rupp, Andy [1 ]
机构
[1] Karlsruhe Inst Technol, Karlsruhe, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I | 2016年 / 9614卷
关键词
Aggregate signatures; Fault-tolerance; Cover-free family; IDENTITY-BASED AGGREGATE; CONSTRUCTIONS; HASH;
D O I
10.1007/978-3-662-49384-7_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aggregate signature schemes allow for the creation of a short aggregate of multiple signatures. This feature leads to significant reductions of bandwidth and storage space in sensor networks, secure routing protocols, certificate chains, software authentication, and secure logging mechanisms. Unfortunately, in all prior schemes, adding a single invalid signature to a valid aggregate renders the whole aggregate invalid. Verifying such an invalid aggregate provides no information on the validity of any individual signature. Hence, adding a single faulty signature destroys the proof of integrity and authenticity for a possibly large amount of data. This is largely impractical in a range of scenarios, e.g. secure logging, where a single tampered log entry would render the aggregate signature of all log entries invalid. In this paper, we introduce the notion of fault-tolerant aggregate signature schemes. In such a scheme, the verification algorithm is able to determine the subset of all messages belonging to an aggregate that were signed correctly, provided that the number of aggregated faulty signatures does not exceed a certain bound. We give a generic construction of fault-tolerant aggregate signatures from ordinary aggregate signatures based on cover-free families. A signature in our scheme is a small vector of aggregated signatures of the underlying scheme. Our scheme is bounded, i.e. the number of signatures that can be aggregated into one signature must be fixed in advance. However the length of an aggregate signature is logarithmic in this number. We also present an unbounded construction, where the size of the aggregate signature grows linearly in the number of aggregated messages, but the factor in this linear function can be made arbitrarily small. The additional information encoded in our signatures can also be used to speed up verification (compared to ordinary aggregate signatures) in cases where one is only interested in verifying the validity of a single message in an aggregate, a feature beyond fault-tolerance that might be of independent interest. For concreteness, we give an instantiation using a suitable cover-free family.
引用
收藏
页码:331 / 356
页数:26
相关论文
共 33 条
  • [1] Synchronized Aggregate Signatures: New Definitions, Constructions and Applications
    Ahn, Jae Hyun
    Green, Matthew
    Hohenberger, Susan
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 473 - 484
  • [2] Bagherzandi A, 2010, LECT NOTES COMPUT SC, V6056, P480
  • [3] Bellare M, 2007, LECT NOTES COMPUT SC, V4377, P145
  • [4] Boldyreva A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P276
  • [5] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [6] Sequential aggregate signatures with lazy verification from trapdoor permutations
    Brogle, Kyle
    Goldberg, Sharon
    Reyzin, Leonid
    [J]. INFORMATION AND COMPUTATION, 2014, 239 : 356 - 376
  • [7] Cramer R, 2007, LECT NOTES COMPUT SC, V4833, P502
  • [8] New constructions of superimposed codes
    D'yachkov, AG
    Macula, AJ
    Rykov, VV
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (01) : 284 - 290
  • [9] Dodis Y, 2002, LECT NOTES COMPUT SC, V2332, P65
  • [10] Dyachkov A.G., 1982, Probl. Peredachi Inform., V18, P7