JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2016, Vol. 51 ›› Issue (7): 107-114.doi: 10.6040/j.issn.1671-9352.0.2016.026

Previous Articles     Next Articles

Cryptanalysis and improvement of two kind of certificateless aggregate signature schemes

  

  1. 1. College of Mathematics and Information Science, Baoji University of Arts and Sciences, Baoji 721013, Shaanxi, China;
    2. College of Mathematics and Information Science, Shaanxi Normal University, Xian 710062, Shaanxi, China
  • Received:2016-01-09 Online:2016-07-20 Published:2016-07-27

Abstract: According to the existing certificateless aggregate signature schemes presented based on bilinear pairings, lots of them have the security flaws and low computational efficiency problem. The security of two certificateless aggregate signature schemes proposed was analyzed, and it is found that the verify equation in the first scheme is not right and the two schemes can not resist forgery attack under TypeⅡ. Finally, an improved scheme based on RSA without bilinear pairing was proposed in this paper. Based on the RSA assumption and the DL problem, it is proved that the new scheme is existentially unforgeable. Compared with other schemes, the new scheme is more efficient and secure.

Key words: aggregate signature, bilinear pairing, certificateless cryptography, RSA assumption

CLC Number: 

  • TP309
[1] ALRIYAMI S S, PATERSON K G. Certificateless public key cryptography[J]. Lecture Notes in Computer Science, 2003, 2894(2):452-473.
[2] LIU Jinwei, ZHANG Zonghua, CHEN Xiaofeng, et al. Certificateless remote anonymous authentication schemes for wireless body area networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2):332-342.
[3] CHEN Hu, ZHANG Futai, SONG Rushun. Efficient certificateless signature and group signature schemes[J]. Journal of Computer Research and Development, 2010, 47(2):231-237.
[4] ZHANG Lei, WU Qianhong, DOMINGO-FERRERC J, et al. Signatures in hierarchical certificateless cryptography: efficient constructions and provable security[J]. Information Sciences, 2014, 272: 223-237.
[5] BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[J]. Lecture Notes in Computer Science, 2003, 2656(1): 416-432.
[6] GONG Zheng, LONG Yu, HONG Xuan, et al. Two certificateless aggregate signatures from bilinear maps[C] // Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. LOS Alamitos: IEEE Computer Society, 2007: 188-193.
[7] ZHANG Lei, ZHANG Futai. A new certificateless aggregate signature scheme[J]. Computer Communications, 2009, 32(6):1079-1085.
[8] XIONG Hu, GUAN Zhi, CHEN Zhong, et al. An efficient certificatless aggregate signature scheme with constant pairing computations[J]. Information Sciences, 2013, 219(10):225-235.
[9] HE Debiao, TIAN Miaomiao, CHEN Jianhua. Insecurity of an efficient certificatless aggregate signature scheme with constant pairing computations[J]. Information Sciences, 2014, 268(4): 32-37.
[10] ZHANG Futai, SHEN Liming, WU Ge. Notes on the security of certificatless aggregate signature scheme[J]. Information Sciences, 2014, 287(1):458-462.
[11] 农强,黄振杰,黄茹芬. 对一种无证书聚合签名方案的改进[J]. 山东大学学报(理学版),2015, 50(11):52-59. NONG Qiang, HUANG Zhenjie, HUANG Rufen. Improvement of a certificateless aggregate signature scheme[J]. Journal of Shandong University(Natural Science), 2015, 50(11):52-59.
[12] 侯红霞,张雪锋,董晓丽. 改进的无证书聚合签名方案[J]. 山东大学学报(理学版),2013,48(9):29-34. HOU Hongxia, ZHANG Xuefeng, DONG Xiaoli. Improved certificateless aggregate signature scheme[J]. Journal of Shandong University(Natural Science), 2013, 48(9):29-34.
[13] 张玉磊,李臣意,王彩芬,等. 无证书聚合签名方案的安全性分析与改进[J]. 电子与信息学报,2015, 37(8):1994-1999. ZHANG Yulei, LI Chenyi, WANG Caifen, et al. Security analysis and improvements of two certificateless aggregate signature schemes[J]. Journal of Electronics and Information Techenology, 2015, 37(8):1994-1999.
[14] 明洋,赵祥模,王育民. 无证书聚合签名方案[J].电子科技大学学报,2014,43(2):188-193. MING Yang, ZHAO Xiangmo, WANG Yuming. Certificateless aggregate signature scheme[J]. Journal of University of Electronic Science and Technology of China, 2014, 43(2):188-193.
[15] 樊爱宛,夏栋梁,杨照锋. 两种无证书聚合签名方案的安全性分析与改进[J]. 山东大学学报(理学版),2015,50(9):29-34. FAN Aiwan, XIA Dongliang, YANG Zhaofeng. Security analysis and improvement of two certificateless aggregate signature schemes[J]. Journal of Shandong University(Natural Science), 2015, 50(9): 29-34.
[16] 喻琇英,何大可.一种新的无证书聚合签名[J].计算机应用研究,2014,31(8):2465-2487. YU Xiuying, HE Dake. New certificateless aggregate signature scheme[J]. Application Research of Computers, 2014, 31(8):2465-2487.
[17] 张玉磊,周冬瑞,李臣意,等. 高效的无证书广义指定验证者聚合签名方案[J].通信学报,2015, 36(2):331-338. ZHANG Yulei, ZHOU Dongrui, LI Chenyi, et al. Certificateless-based efficient aggregate signature scheme with universal designated verifier[J]. Journal on Communications, 2015, 36(2):331-338.
[18] DENG Lunzhi, ZENG Jiwen, QU Yunyun. Certificateless proxy signature from RSA[J]. Mathematical Problems in Engineering, 2014,(9):1-10.
[1] ZHU Bin-rui, QIN Jing, HAN Fei. Searchable encryption scheme based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 78-86.
[2] NONG Qiang, HUANG Zhen-jie, HUANG Ru-fen. Improvement of a certificateless aggregate signature scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(11): 52-59.
[3] FAN Ai-wan, XIA Dong-liang, YANG Zhao-feng. Security analysis and improvement of two certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(09): 42-48.
[4] HOU Hong-xia1,2, ZHANG Xue-feng2, DONG Xiao-li2. Improved certificateless aggregate signature scheme [J]. J4, 2013, 48(09): 29-34.
[5] ZHANG Fang-guo. Elliptic curves in cryptography: past, present and future… [J]. J4, 2013, 48(05): 1-13.
[6] HOU Hong-xia, HE Ye-feng. Certificateless chameleon digital signature scheme for strong designated verifier [J]. J4, 2012, 47(9): 15-18.
[7] WU Lei 1, KONG Fanyu 2. An efficient IDbased proxy ring signature scheme [J]. J4, 2009, 44(1): 40-43 .
[8] LIU Xiao-dong,JIANG Ya-li,LI Da-xing . Two biometric identities based signature schemes [J]. J4, 2007, 42(12): 24-28 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!