Attack on Chen et al.'s certificateless aggregate signature scheme

被引:10
|
作者
Zhang, Jianhong [1 ]
Zhao, Xubing [1 ]
Mao, Jian [2 ]
机构
[1] North China Univ Technol, Coll Sci, Beijing 100144, Peoples R China
[2] Beihang Univ, Sch Elect & Informat Engn, Beijing 100019, Peoples R China
关键词
certificateless signature; aggregate signature; unforgeability; attack; security analysis; EFFICIENT; SECURE;
D O I
10.1002/sec.1380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless aggregate signature can provide an efficient way to verify a large amount of signatures from different users. This feature makes it very useful in the environments with low bandwidth communication, low storage, and low computability. Recently, Chen et al. proposed a new certificateless aggregate signature scheme. They claim that their scheme is provably secure under the computational Diffie-Hellman problem. Unfortunately, this paper shows that Chen et al.'s scheme is insecure, it cannot resist Type I and Type II adversaries, and the corresponding attacks are given. Furthermore, we also show their scheme exists a more powerful attack, namely, anyone can forge a certificateless signature on an arbitrary message in this attack. Finally, we discuss the reason to produce such attacks and give the corresponding suggestions to resist such attacks. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:54 / 59
页数:6
相关论文
共 50 条
  • [1] New Forgery Attack on Chang et al.'s signature scheme
    Li, Kou
    Ming, Jin
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 5 - 6
  • [2] Improved Chen et al.'s Concurrent Signature Scheme Providing Anonymity and Identification
    Hwang Shinjia
    Hsu Teysu
    [J]. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 639 - 641
  • [3] Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme
    Park, Chanhyeok
    Cho, Sangrae
    Cho, Young-Seob
    Kim, Soohyung
    Lee, Hyung Tae
    [J]. IEEE ACCESS, 2024, 12 : 16462 - 16473
  • [4] Attack on Libert et al.'s ID-Based Undeniable Signature Scheme
    Li Zichen
    Yan Yunsheng
    Zhang Juanmei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04) : 748 - 750
  • [5] A secure Certificateless Aggregate Signature Scheme
    Kang, Baoyuan
    Xu, Danhui
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 55 - 67
  • [6] Efficient Certificateless Aggregate Signature Scheme
    Gwoboa Horng
    Yuan-Yu Tsai
    Chi-Shiang Chan
    [J]. Journal of Electronic Science and Technology, 2012, (03) : 209 - 214
  • [7] Insecurity of a Certificateless Aggregate Signature Scheme
    Shen, Han
    Chen, Jianhua
    Hu, Hao
    Shen, Jian
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (02): : 660 - 662
  • [8] An Efficient Certificateless Aggregate Signature Scheme
    KANG Baoyuan
    WANG Mu
    JING Dongya
    [J]. Wuhan University Journal of Natural Sciences, 2017, 22 (02) : 165 - 170
  • [9] Cryptanalysis of a Certificateless Aggregate Signature Scheme
    Kumar, Pankaj
    Sharma, Vishnu
    Sharma, Gaurav
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1095 - 1098
  • [10] Insecurity of a certificateless aggregate signature scheme
    Zhang, Hui
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1547 - 1552