JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2015, Vol. 50 ›› Issue (11): 52-59.doi: 10.6040/j.issn.1671-9352.0.2014.442

Previous Articles     Next Articles

Improvement of a certificateless aggregate signature scheme

NONG Qiang, HUANG Zhen-jie, HUANG Ru-fen   

  1. Department of Computer Science, Minnan Normal University, Zhangzhou 363000, Fujian, China
  • Received:2014-09-29 Revised:2015-11-11 Online:2015-11-20 Published:2015-12-09

Abstract: Three forgery attack algorithms on the existing certificateless aggregate signature scheme using the intractability of computational Diffie-Hellman problem were presented. It was found that the "malicious-but-passive" or the "honest-but-curious" key generation center could forge a valid aggregate signature on any message on behalf of any user. The scheme also can not resist collusion attack by dishonest users. The reasons of insecurity of the original scheme were analyzed. By means of adding the user's public key as an input parameter in the stage of partial private key generation, and binding the partial private key and secret value to different Hash functions respectively in the stage of signature generation, an improved scheme without secure channel and bilinear pairing was proposed. The security of the improved scheme can be reduced to the more general discrete logarithm problem.

Key words: certificateless aggregate signature, secure channel, discrete logarithm problem, bilinear pairing, forgery attack

CLC Number: 

  • TP309
[1] AL-RIYAMI S, PATERSON K. Certificateless public key cryptography[C]//Advances in Cryptology-Asiacrypt 2003.Berlin:Springer, 2003:452-473.
[2] BONEH D, GENTRY C, LYNN B, et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]//Proceedings of Cryptology-Eurocrypt 2003. Berlin:Springer, 2003:416-432.
[3] GONG Zheng, LONG Yu, HONG Xuan, et al. Two certificateless aggregate signatures from bilinear maps[C]//Proceedings of IEEE SNPD 2007. Washington:IEEE Computer Society, 2007:188-193.
[4] ZHANG Lei, QIN Bo, WU Qianhong, et al. Efficient many-to-one authentication with certificateless aggregate signatures[J]. Computer Networks, 2010, 54(14):2482-2491.
[5] XIONG Hu, GUAN Zhi, CHEN Zhong, et al. An efficient certificateless aggregate signature with constant pairing computations[J]. Information Science, 2013, 219:225-235.
[6] ZHANG Futai, SHEN Limin, WU Ge. Notes on the security of certificateless aggregate signature schemes[EB/OL].[2014-04-24]. http://dx.doi.org/10.1016/j.ins.2014.07.019.
[7] 侯红霞, 张雪锋, 董晓丽. 改进的无证书聚合签名方案[J]. 山东大学学报:理学版, 2013, 48(9):29-34. HOU Hongxia, ZHANG Xuefeng, DONG Xiaoli. Improved certificateless aggregate signature scheme[J]. Journal of Shandong University:Natural Science, 2013, 48(9):29-34.
[8] CAO Xuefei, KOU Weidong, DU Xiaoni. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges[J]. Information Sciences, 2010, 180(15):2895-2903.
[9] RAFAEL C, RICARDO D.Two notes on the security of certificateless signatures[C]//Proceedings of ProvSec 2007. Berlin:Springer, 2007:85-102.
[10] KOBLITZ N, MENEZES A, VANSTONE S. The state of elliptic curve cryptography[J]. Designs, Codes and Cryptography, 2000, 19(2-3):173-193.
[11] ZHANG Yanchao, LIU Wei, LOU Wenjing, et al. Securing mobile Ad Hoc networks with certificateless public keys[J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(4):386-399.
[1] . Cryptanalysis and improvement of two kind of certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 107-114.
[2] ZHU Bin-rui, QIN Jing, HAN Fei. Searchable encryption scheme based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 78-86.
[3] FAN Ai-wan, XIA Dong-liang, YANG Zhao-feng. Security analysis and improvement of two certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(09): 42-48.
[4] HOU Hong-xia1,2, ZHANG Xue-feng2, DONG Xiao-li2. Improved certificateless aggregate signature scheme [J]. J4, 2013, 48(09): 29-34.
[5] ZHANG Fang-guo. Elliptic curves in cryptography: past, present and future… [J]. J4, 2013, 48(05): 1-13.
[6] WU Lei 1, KONG Fanyu 2. An efficient IDbased proxy ring signature scheme [J]. J4, 2009, 44(1): 40-43 .
[7] LIU Xiao-dong,JIANG Ya-li,LI Da-xing . Two biometric identities based signature schemes [J]. J4, 2007, 42(12): 24-28 .
[8] LI Guo-wei,LI Ru-peng and LI Da-xing . Analysis and improvement of Wang threshold signature scheme [J]. J4, 2007, 42(1): 55-58 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!