New Identity-based Sequential Aggregate Signature Scheme from RSA

被引:4
作者
Tsai, Jia-Lun [1 ]
Lo, Nai-Wei [1 ]
Wu, Tzong-Chen [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
来源
2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST) | 2013年
关键词
sequential aggregate signature scheme; identity-based; RSA; forgery attack; VERIFIABLY ENCRYPTED SIGNATURES;
D O I
10.1109/ISBAST.2013.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An identity-based sequential aggregate signature (IBSAS) scheme provides a shorter aggregate signature for multiple signers in which each signer has signed his/her own message and all generated signatures are aggregated in sequence. During aggregate signature verification process, a verifier can identify the generated order and the validity of signatures. In 2012, Dou et al. first proposed two new IBSAS schemes based on RSA. One scheme is non-interactive and the other is interactive. This study discovers that the non-interactive IBSAS scheme of Dou et al. is vulnerable to a forgery attack. In our attack, a legal but malicious signer is capable to forge an IBSAS without knowing the other signers' private keys. In order to overcome the weakness, we propose a non-interactive IBSAS scheme based on the identity-based signature scheme of Qian and Cao. We then show that our non-interactive IBSAS scheme is secure against proposed forgery attack.
引用
收藏
页码:136 / 140
页数:5
相关论文
共 19 条
  • [1] [Anonymous], P 14 ACM C COMP COMM
  • [2] [Anonymous], LNCS
  • [3] Bellare M, 2007, LECT NOTES COMPUT SC, V4377, P145
  • [4] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [5] Practical RSA Signature Scheme Based on Periodical Rekeying for Wireless Sensor Networks
    Chang, Shih-Ying
    Lin, Yue-Hsun
    Sun, Hung-Min
    Wu, Mu-En
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2012, 8 (02)
  • [6] A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES
    Chang, Ya-Fen
    Tai, Wei-Liang
    Lin, Chung-Yi
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 60 - 68
  • [7] Cheng XG, 2005, LECT NOTES COMPUT SC, V3483, P1046
  • [8] Dou BN, 2012, INT J INNOV COMPUT I, V8, P6401
  • [9] Gentry C, 2006, LECT NOTES COMPUT SC, V3958, P257
  • [10] GUILLOU LC, 1990, LECT NOTES COMPUT SC, V403, P216