Certificateless aggregate signature scheme secure against fully chosen-key attacks

被引:33
|
作者
Wu, Ge [1 ,3 ,4 ]
Zhang, Futai [2 ]
Shen, Limin [2 ]
Guo, Fuchun [3 ]
Susilo, Willy [3 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing, Peoples R China
[2] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Peoples R China
[3] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
[4] Purple Mt Labs, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless aggregate signature; Security model; Fully chosen-key attacks; Malicious KGC attacks; CRYPTANALYSIS; INSECURITY; IMPROVEMENT;
D O I
10.1016/j.ins.2019.11.037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless aggregate signature (CLAS) schemes enjoy the benefits of both certificate less cryptography and aggregate signature features. Specifically, it not only simplifies the certificate management without introducing the key escrow problem but also transforms many signatures into one aggregate signature to save communication and computation cost. CLAS is a powerful cryptographic tool, yet its security should be thoroughly analyzed before being implemented. In this paper, we give a new insight into the security of CLAS schemes. We introduce a potential and realistic attack called fully chosen-key attacks that has not been considered in the traditional security models and define the security model against fully chosen-key attacks. In contrast to the traditional models, the adversary is allowed to hold all the signers' private keys and its goal is not to forge an aggregate signature but to output invalid single signatures that can be aggregated into a valid aggregate signature. We find there is no CLAS scheme secure in traditional security models that is secure against fully chosen-key attacks and then demonstrate how to reinforce the security of, an existing scheme to withstand such an attack. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:288 / 301
页数:14
相关论文
共 50 条
  • [21] Efficient Certificateless Aggregate Signature Scheme
    Gwoboa Horng
    Yuan-Yu Tsai
    Chi-Shiang Chan
    Journal of Electronic Science and Technology, 2012, (03) : 209 - 214
  • [22] Insecurity of a Certificateless Aggregate Signature Scheme
    Shen, Han
    Chen, Jianhua
    Hu, Hao
    Shen, Jian
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (02): : 660 - 662
  • [23] Analysis of a Certificateless Aggregate Signature Scheme
    Wang, Chenhui
    Yuan, Yumin
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 421 - 423
  • [24] A new certificateless aggregate signature scheme
    Zhang, Lei
    Zhang, Futai
    COMPUTER COMMUNICATIONS, 2009, 32 (06) : 1079 - 1085
  • [25] Cryptanalysis of a Certificateless Aggregate Signature Scheme
    Kumar, Pankaj
    Sharma, Vishnu
    Sharma, Gaurav
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1095 - 1098
  • [26] Insecurity of a certificateless aggregate signature scheme
    Zhang, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1547 - 1552
  • [27] An Efficient Certificateless Aggregate Signature Scheme
    KANG Baoyuan
    WANG Mu
    JING Dongya
    Wuhan University Journal of Natural Sciences, 2017, 22 (02) : 165 - 170
  • [28] Cryptanalysis of a certificateless aggregate signature scheme
    Wang, Liangliang
    Chen, Kefei
    Long, Yu
    Wang, Huige
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1353 - 1358
  • [29] Efficient Certificateless Aggregate Signature Scheme
    Gwoboa Horng
    YuanYu Tsai
    ChiShiang Chan
    JournalofElectronicScienceandTechnology, 2012, 10 (03) : 209 - 214
  • [30] On the Security of a Certificateless Aggregate Signature Scheme
    Shim, Kyung-Ah
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (10) : 1136 - 1138