Certificateless aggregate signature scheme secure against fully chosen-key attacks

被引:34
作者
Wu, Ge [1 ,3 ,4 ]
Zhang, Futai [2 ]
Shen, Limin [2 ]
Guo, Fuchun [3 ]
Susilo, Willy [3 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing, Peoples R China
[2] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Peoples R China
[3] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
[4] Purple Mt Labs, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless aggregate signature; Security model; Fully chosen-key attacks; Malicious KGC attacks; CRYPTANALYSIS; INSECURITY; IMPROVEMENT;
D O I
10.1016/j.ins.2019.11.037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless aggregate signature (CLAS) schemes enjoy the benefits of both certificate less cryptography and aggregate signature features. Specifically, it not only simplifies the certificate management without introducing the key escrow problem but also transforms many signatures into one aggregate signature to save communication and computation cost. CLAS is a powerful cryptographic tool, yet its security should be thoroughly analyzed before being implemented. In this paper, we give a new insight into the security of CLAS schemes. We introduce a potential and realistic attack called fully chosen-key attacks that has not been considered in the traditional security models and define the security model against fully chosen-key attacks. In contrast to the traditional models, the adversary is allowed to hold all the signers' private keys and its goal is not to forge an aggregate signature but to output invalid single signatures that can be aggregated into a valid aggregate signature. We find there is no CLAS scheme secure in traditional security models that is secure against fully chosen-key attacks and then demonstrate how to reinforce the security of, an existing scheme to withstand such an attack. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:288 / 301
页数:14
相关论文
共 50 条
  • [1] A short certificateless aggregate signature against coalition attacks
    Yang, Xiaodong
    Wang, Jinli
    Ma, Tingchun
    Li, Yutong
    Wang, Caifen
    PLOS ONE, 2018, 13 (12):
  • [2] A secure Certificateless Aggregate Signature Scheme
    Kang, Baoyuan
    Xu, Danhui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 55 - 67
  • [3] An efficient and secure certificateless aggregate signature scheme
    Xu, Ran
    Zhou, Yanwei
    Yang, Qiliang
    Yang, Kunwei
    Han, Yu
    Yang, Bo
    Xia, Zhe
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 147
  • [4] Secure and efficient certificateless aggregate signature scheme from bilinear pairings
    Gayathri, N. B.
    Gowri, T.
    Reddy, P. Vasudeva
    INFORMATION SECURITY JOURNAL, 2019, 28 (06): : 149 - 163
  • [5] Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs
    Xu, Zhiyan
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [6] New Efficient Certificateless Aggregate Signature Scheme
    Xu, Zhiyan
    Wu, Libing
    Ren, Yongjun
    He, Debiao
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (07): : 2023 - 2033
  • [7] Cryptanalysis of a certificateless aggregate signature scheme
    Wang, Liangliang
    Chen, Kefei
    Long, Yu
    Wang, Huige
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1353 - 1358
  • [8] Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen Key Attacks for Industrial Internet of Things
    Hou, Yingzhe
    Xiong, Hu
    Huang, Xin
    Kumari, Saru
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (11) : 8935 - 8948
  • [9] Attacks against Two Provably Secure Certificateless Signature Schemes
    Hu Guozheng
    Hong Fan
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 246 - +
  • [10] Improve and Secure a Mediated Certificateless Signature Scheme
    Qian, Xuezhong
    Wang, Xu
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 1079 - 1084