JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2015, Vol. 50 ›› Issue (09): 42-48.doi: 10.6040/j.issn.1671-9352.0.2014.539

Previous Articles     Next Articles

Security analysis and improvement of two certificateless aggregate signature schemes

FAN Ai-wan, XIA Dong-liang, YANG Zhao-feng   

  1. School of Software, Pingdingshan University, Pingdingshan 467002, Henan, China
  • Received:2014-12-01 Revised:2015-05-18 Online:2015-09-20 Published:2015-09-26

Abstract: The security flaws and low computational efficiency problem exist in most of the aggregate signature schemes. Based on the security analysis of two kinds of certificateless aggregate signature scheme, it is found that the two schemes can not resist forgery attack under Type I and Type II. Aiming at this sort of problems, we proposed an improved scheme that has changed the combination mode of parameters in the process of signature and has strengthened the constraints of master key and the public key in the process of aggregate signature verification. It was proved that the prosed scheme is existentially unforgeable against adaptive chosen message attacks under the computational Diffie-Hellman assumption in the random oracle model. The efficiency analysis shows that the scheme needs only 4 bilinear pairing operations in the signature process and the verification process, and the length of the signature is fixed. This improved scheme is more efficient comparing with the other certificateless aggregate signature schemes in similar secure level.

Key words: certificateless cryptography, bilinear pairing, random oracle model, aggregate signature

CLC Number: 

  • TP309
[1] BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[C]//Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques.Berlin: Springer-Verlag, 2003:416-432.
[2] AL-RIYAMI S, PATERSON K.Certificateless public key cryptography[C]//Proceedings of Asiacrypt 2003. Berlin: Springer-Verlag, 2003:452-473.
[3] GONG Zheng, LONG Yu, HONG Xuan, et al. Two certificateless aggregate signatures from bilinear maps[C]//Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Washington: IEEE Computer Society, 2007: 188-193.
[4] ZHANG Lei, QIN Bo, WU Qianhong, et al. Efficient many-to-one authentication with certificateless aggregate signatures[J]. Computer Networks, 2010, 54(14):2482-2491.
[5] HE Debao, TIAN Miaomiao, CHEN Jianhua, et al. An efficient certificateless aggregate signature with constant pairing computations[EB/OL].[2012-02-03].http://eprint.Iacr.org/2012/445.pdf.
[6] XIONG Hu, GUAN Zhi, CHEN Zhong, et al. An efficient certificateless aggregate signature with constant pairing computations[J]. Information Science, 2013, 219:225-235.
[7] ZHANG Futai, SHEN Liming, WU Ge, et al. Notes on the security of certificateless aggregate signature schemes[J]. Information Science, 2014, 287:32-37.
[8] CHENG Lin, WEN Qiaoyan, JIN Zhengping, et al. Cryptanalysis and improvement of a certificateless aggregate signature scheme[J]. Information Science, 2015, 295:337-346.
[9] 喻琇瑛, 何大可.一个新的无证书聚合签名[J].计算机应用研究, 2014, 31(8):2485-2487. YUE Xiuying, HE Dake. New certificateless aggregate signature scheme[J]. Application Research of Computers, 2014, 31(8):2485-2487.
[10] 侯红霞, 张雪锋, 董晓丽, 等.改进的无证书聚合签名方案[J].山东大学学报:理学版, 2013, 48(9):29-34. HOU Hongxia, ZHANG Xuefeng, DONG Xiaoli, et al. Improved certificateless aggregate signature scheme[J]. Journal of Shandong University: Natural Science, 2013, 48(9):29-34.
[11] 杜红珍, 黄梅娟, 温巧燕, 等.高效的可证明安全的无证书聚合签名方案[J].电子学报, 2013, 41(1):73-76. DU Hongzhen, HUANG Meijuan, WEN Qiaoyan, et al. Efficient and provably-secure certificateless aggregate signature scheme[J]. Acta Electronica Sinica, 2013, 41(1):73-76.
[12] 明洋, 赵祥模, 王育民,等.无证书聚合签名方案[J].电子科技大学学报, 2014, 43(2): 2188-2193. MING Yang, ZHAO Xiangmo, WANG Yumin, et al. Certificateless aggregate signature scheme[J]. Journal of University of Electronic Science and Technology of China, 2014, 43(2):2188-2193.
[1] . Cryptanalysis and improvement of two kind of certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 107-114.
[2] ZHU Bin-rui, QIN Jing, HAN Fei. Searchable encryption scheme based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 78-86.
[3] NONG Qiang, HUANG Zhen-jie, HUANG Ru-fen. Improvement of a certificateless aggregate signature scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(11): 52-59.
[4] HOU Hong-xia1,2, ZHANG Xue-feng2, DONG Xiao-li2. Improved certificateless aggregate signature scheme [J]. J4, 2013, 48(09): 29-34.
[5] ZHANG Fang-guo. Elliptic curves in cryptography: past, present and future… [J]. J4, 2013, 48(05): 1-13.
[6] HOU Hong-xia, HE Ye-feng. Certificateless chameleon digital signature scheme for strong designated verifier [J]. J4, 2012, 47(9): 15-18.
[7] YAN Zhao-xiang. Chosen cipher-text security proof of ZS encryption scheme [J]. J4, 2010, 45(11): 115-121.
[8] WU Lei 1, KONG Fanyu 2. An efficient IDbased proxy ring signature scheme [J]. J4, 2009, 44(1): 40-43 .
[9] LIU Xiao-dong,JIANG Ya-li,LI Da-xing . Two biometric identities based signature schemes [J]. J4, 2007, 42(12): 24-28 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!