Cryptanalysis and improvement of a certificateless aggregate signature scheme

被引:74
作者
Cheng, Lin [1 ,2 ]
Wen, Qiaoyan [1 ]
Jin, Zhengping [1 ]
Zhang, Hua [1 ]
Zhou, Liming [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switch Technol, Beijing 100876, Peoples R China
[2] China Informat Technol Secur Evaluat Ctr, Beijing 100085, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Aggregate signature; Certificateless signature;
D O I
10.1016/j.ins.2014.09.065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aggregate signature can combine n signatures on n messages from n users into a single short signature, and the resulting signature can convince the verifier that the n users indeed signed the n corresponding messages. This feature makes aggregate signature very useful especially in environments with low band width communication, low storage and low computability since it greatly reduces the total signature length and verification cost. Recently, Xiong et al. presented an efficient certificateless aggregate signature scheme. They claimed that their scheme was provably secure in a strengthened security model, where the "malicious-but-passive" KGC attack was considered. In this paper, we show that Xiong et al.'s certificateless aggregate signature scheme is insecure even against "honestbut-curious" KGC attack, an improved scheme which is really secure against "maliciousbut-passive" KGC attack in the random oracle model. Performance analysis shows that our new scheme is more efficient than the other secure certificateless aggregate signature schemes. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:337 / 346
页数:10
相关论文
共 21 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
[Anonymous], 2006, J ELECT CHINA
[3]  
Au M. H., 2007, P 2 ACM S INF COMP C, P302
[4]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[5]   A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges [J].
Cao, Xuefei ;
Kou, Weidong ;
Du, Xiaoni .
INFORMATION SCIENCES, 2010, 180 (15) :2895-2903
[6]  
Castro R., 2007454 CRYPT ARCH
[7]   Identity-based key agreement protocols from pairings [J].
Chen, L. ;
Cheng, Z. ;
Smart, N. P. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) :213-241
[8]  
Cheon J., 2004131 CRYPT ARCH
[9]  
Dent AW, 2008, LECT NOTES COMPUT SC, V4939, P344, DOI 10.1007/978-3-540-78440-1_20
[10]  
Gentry C, 2006, LECT NOTES COMPUT SC, V3958, P257