Security Analysis of the Unrestricted Identity-Based Aggregate Signature Scheme

被引:1
|
作者
Lee, Kwangsu [1 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Ctr Informat Secur Technol, Seoul, South Korea
来源
PLOS ONE | 2015年 / 10卷 / 05期
基金
新加坡国家研究基金会;
关键词
VERIFIABLY ENCRYPTED SIGNATURES; MULTISIGNATURES;
D O I
10.1371/journal.pone.0128081
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Aggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a short signature. An ideal aggregate signature scheme is an identity-based aggregate signature (IBAS) scheme that supports full aggregation since it can reduce the total transmitted data by using an identity string as a public key and anyone can freely aggregate different signatures. Constructing a secure IBAS scheme that supports full aggregation in bilinear maps is an important open problem. Recently, Yuan et al. proposed such a scheme and claimed its security in the random oracle model under the computational Diffie-Hellman assumption. In this paper, we show that there is an efficient forgery on their IBAS scheme and that their security proof has a serious flaw.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Efficient Unrestricted Identity-Based Aggregate Signature Scheme
    Yuan, Yumin
    Zhan, Qian
    Huang, Hua
    [J]. PLOS ONE, 2014, 9 (10):
  • [2] On the Security of an Identity-Based Aggregate Signature Scheme
    Yap, Wun-She
    Heng, Swee-Huay
    Goi, Bok-Min
    [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1523 - +
  • [3] An efficient provable security identity-based proxy aggregate signature scheme
    Guo, Lei
    Hu, Defa
    [J]. International Journal of Applied Mathematics and Statistics, 2013, 51 (23): : 212 - 222
  • [4] On the security of an identity-based signature scheme
    [J]. Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [5] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    [J]. IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [6] Security analysis of an identity-based strongly unforgeable signature scheme
    Lee, Kwangsu
    Lee, Dong Hoon
    [J]. INFORMATION SCIENCES, 2014, 286 : 29 - 34
  • [7] IDENTITY-BASED SEQUENTIAL AGGREGATE SIGNATURE SCHEME BASED ON RSA
    Dou, Bennian
    Chen, Chun-Hua
    Zhang, Hong
    Xu, Chungen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (09): : 6401 - 6413
  • [8] Security Analysis of a Revocable and Strongly Unforgeable Identity-Based Signature Scheme
    Yang, Xiaodong
    Ma, Tingchun
    Yang, Ping
    An, Faying
    Wang, Caifen
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (03): : 575 - 587
  • [9] Identity-based quantum signature scheme with strong security
    Xiangjun Xin
    Zhuo Wang
    Qinglan Yang
    [J]. Optical and Quantum Electronics, 2019, 51
  • [10] A tight security reduction identity-based signature scheme
    Kang, Li
    Lu, Xianhui
    Tang, Xiaohu
    Fan, Jia
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 730 - 734