Certificateless aggregate signature scheme secure against fully chosen-key attacks

被引:34
作者
Wu, Ge [1 ,3 ,4 ]
Zhang, Futai [2 ]
Shen, Limin [2 ]
Guo, Fuchun [3 ]
Susilo, Willy [3 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing, Peoples R China
[2] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Peoples R China
[3] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
[4] Purple Mt Labs, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless aggregate signature; Security model; Fully chosen-key attacks; Malicious KGC attacks; CRYPTANALYSIS; INSECURITY; IMPROVEMENT;
D O I
10.1016/j.ins.2019.11.037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless aggregate signature (CLAS) schemes enjoy the benefits of both certificate less cryptography and aggregate signature features. Specifically, it not only simplifies the certificate management without introducing the key escrow problem but also transforms many signatures into one aggregate signature to save communication and computation cost. CLAS is a powerful cryptographic tool, yet its security should be thoroughly analyzed before being implemented. In this paper, we give a new insight into the security of CLAS schemes. We introduce a potential and realistic attack called fully chosen-key attacks that has not been considered in the traditional security models and define the security model against fully chosen-key attacks. In contrast to the traditional models, the adversary is allowed to hold all the signers' private keys and its goal is not to forge an aggregate signature but to output invalid single signatures that can be aggregated into a valid aggregate signature. We find there is no CLAS scheme secure in traditional security models that is secure against fully chosen-key attacks and then demonstrate how to reinforce the security of, an existing scheme to withstand such an attack. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:288 / 301
页数:14
相关论文
共 50 条
  • [21] A Certificateless Aggregate Signature Scheme Based on Blockchain for EMR
    Shu, Hong
    Chen, Fulong
    Xie, Dong
    Qi, Ping
    Huang, Yongqing
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 437 - 443
  • [22] An efficient certificateless aggregate signature scheme for the Internet of Vehicles
    Zhao, Yanan
    Hou, Yingzhe
    Wang, Lili
    Kumari, Saru
    Khan, Muhammad Khurram
    Xiong, Hu
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (05):
  • [23] Efficient and provide security certificateless aggregate signature scheme
    Zhou, Yan-Wei
    Yang, Bo
    Zhang, Wen-Zheng
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (12): : 3204 - 3214
  • [24] An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps
    Kumar, Pankaj
    Sharma, Vishnu
    Sharma, Gaurav
    Bhatia, Tarunpreet
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (04) : 89 - 108
  • [25] Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme
    Chen, Y.-C. (s9756034@cs.nchu.edu.tw), 2013, Springer Science and Business Media Deutschland GmbH (21): : 61 - 68
  • [26] Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192
    Zhu, Chunbo
    Wang, Gaoli
    Zhu, Boyu
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 573 - 587
  • [27] A New Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs
    Yuan, Beibei
    Huang, Hui
    Wu, Chenhuang
    MATHEMATICS, 2023, 11 (23)
  • [28] A certificateless aggregate signature scheme for security and privacy protection in VANET
    Cahyadi, Eko Fajar
    Su, Tzu-Wei
    Yang, Chou-Chen
    Hwang, Min-Shiang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (05)
  • [29] Comments on ''Certificateless Short Aggregate Signature Scheme for Mobile Devices''
    Park, Je Hong
    Koo, Bonwook
    IEEE ACCESS, 2024, 12 : 46484 - 46486
  • [30] An Improved Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks
    Yang, Xiaodong
    Chen, Chunlin
    Ma, Tingchun
    Li, Yutong
    Wang, Caifen
    PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 2334 - 2338