On the Security of an Identity-Based Aggregate Signature Scheme

被引:0
|
作者
Yap, Wun-She [1 ]
Heng, Swee-Huay [2 ]
Goi, Bok-Min [2 ]
机构
[1] Inst Infocomm Res, 21 Heng Mui Keng Terrace, Singapore 119613, Singapore
[2] MultimediaUniv, Ctr Crytog & Informat Secur CCIS, Cyberjaya, Malaysia
关键词
Aggregate signature; identity-based; cryptanalysis;
D O I
10.1109/WAINA.2008.173
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In ACISP 2006, Paterson and Schuldt proposed a provably secure identity-based signature scheme. Not long after that, the same authors claimed that their proposed scheme above also allows a form of aggregation in which the multiple signatures from the different signers on a single message can be aggregated into a single signature with a more efficient representation than the original set of signatures. The proposed identity-based signature scheme is provably secure in the standard model. In this paper, we show that the Paterson and Schuldt identity-based signature scheme does not support aggregation since the resulting identity-based aggregate signature scheme is vulnerable to both the insider and outsider attacks.
引用
收藏
页码:1523 / +
页数:3
相关论文
共 50 条
  • [1] Security Analysis of the Unrestricted Identity-Based Aggregate Signature Scheme
    Lee, Kwangsu
    Lee, Dong Hoon
    [J]. PLOS ONE, 2015, 10 (05):
  • [2] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    [J]. IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [3] Efficient Unrestricted Identity-Based Aggregate Signature Scheme
    Yuan, Yumin
    Zhan, Qian
    Huang, Hua
    [J]. PLOS ONE, 2014, 9 (10):
  • [4] IDENTITY-BASED SEQUENTIAL AGGREGATE SIGNATURE SCHEME BASED ON RSA
    Dou, Bennian
    Chen, Chun-Hua
    Zhang, Hong
    Xu, Chungen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (09): : 6401 - 6413
  • [5] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    [J]. INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [6] A tight security reduction identity-based signature scheme
    Kang, Li
    Lu, Xianhui
    Tang, Xiaohu
    Fan, Jia
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 730 - 734
  • [7] Identity-based quantum signature scheme with strong security
    Xiangjun Xin
    Zhuo Wang
    Qinglan Yang
    [J]. Optical and Quantum Electronics, 2019, 51
  • [8] Identity-based quantum signature scheme with strong security
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    [J]. OPTICAL AND QUANTUM ELECTRONICS, 2019, 51 (12)
  • [9] RKA Security of Identity-Based Homomorphic Signature Scheme
    Chang, Jinyong
    Ma, Hui
    Zhang, Anling
    Xu, Maozhi
    Xue, Rui
    [J]. IEEE ACCESS, 2019, 7 : 50858 - 50868
  • [10] Identity-Based Digital Signature Scheme with Forward Security
    Tang Lei
    Liu Yali
    [J]. PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 290 - 293