A Provably Secure and Compact Certificateless Aggregate Signature Scheme
XU Yan1,2, HUANG Liu-sheng1,3, TIAN Miao-miao1,3, ZHONG Hong2, CUI Jie2
1. School of Computer Science and Technology, University of Science and Technology of China, Hefei, Anhui 230026, China; 2. School of Computer Science and Technology, Anhui University, Hefei, Anhui 230601, China; 3. Suzhou Institute for Advanced Study, University of Science and Technology of China, Suzhou, Jiangsu 215123, China
Abstract:Aggregate signature schemes are particularly useful for authentication in resource-constrained wireless networks for realizing batch verification.Certificateless cryptosystems can resolve the certificate management problem or key escrow problem in aggregate signature schemes.This paper firstly analyzed a certificatelss aggregate signature(CLAS) scheme.Then,a more efficient CLAS scheme that requires less bilinear paring operations was provided.The security analysis showed that this scheme can resist the forgery attack under the random oracle model,the security was equal to resolve CDH problem.
[1] Zhu H,Lin X,Lu R,et al.AEMA:An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks[A].Proceedings of the 8th International Conference on Communications[C].IEEE,2008.1436-1440. [2] Zhang C,Lu R,Lin X,et al.An efficient identity-based batch verification scheme for vehicular sensor networks[A].Proceedings of INFOCOM 2008[C].IEEE,2008.816-824. [3] Boneh D,Gent ry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps[A].Proceedings of EUROCRYPT 2003[C].Berlin.Springer,2003.416-432. [4] Lysyanskaya A,Micali S,Reyzin L,et al.Sequential aggregate signatures from trapdoor permutations[A].Proceedings of EUROCRYPT 2004[C].Berlin:Springer,2004.74-90. [5] Gentry C,Ramzan Z.Identity-based aggregate signatures[A].Proceedings of Public Key Cryptography-PKC 2006[C].Berlin:Springer,2006.257-273. [6] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[A].Proceedings of ASIACRYPT 2003[C].Berlin:Springer,2003.452-473. [7] Tian M M,Yang W,Huang L S.Cryptanalysis and improvement of a certificateless multi-proxy signature scheme[J].Fundamenta Informaticae,2014,129(4):365-375. [8] Tian M M,Huang L S,Yang W.Practical certificateless short signature scheme[J].International Journal of Electronic Security and Digital Forensics,2014,6(3):204-218. [9] Gong Z,Long Y,Hong X,et al.Two certificateless aggregate signatures from bilinear maps[A].Proceedings of the IEEE SNPD 2007[C].IEEE,2007.188-193. [10] Zhang L,Zhang F T.A new certificateless aggregate signature scheme[J].Computer Communications,2009,32(6):1079-1085. [11] Zhang L,Qin B,Wu Q,et al.Novel efficient certificateless aggregate signatures[A].Proceedings of AAECC 2009[C].Berlin:Springer,2009.235-238. [12] Zhang L,Qin B,Wu Q,et al.Efficient many-to-one authentication with certificateless aggregate signatures[J].Computer Networks,2010,54(14):2482-2491. [13] Xiong H,Guan Z,Chen Z,et al.An efficient certificateless aggregate signature with constant pairing computations[J].Information Sciences,2013,219:225-235. [14] 杜红珍,黄梅娟,温巧燕.高效的可证明安全的无证书聚合签名方案[J].电子学报,2013,41(1):72-76.DU Hong-zhen,HUANG Mei-juan,WEN Qiao-yan.Efficient and Provably-secure certificateless aggregate signature scheme[J].Acta Electronica Sinica,2013,41(1):72-76.(in Chinese) [15] Zhou M,Zhang M,Wang C,et al.CCLAS:A practical and compact certificateless aggregate signature with share extraction[J].International Journal of Network Security,2014,16(2):157-164. [16] He D B,Tian M M,Chen J H.Insecurity of an efficient certificateless aggregate signature with constant pairing computations[J].Information Sciences,2014,268:458-462. [17] Cheng L,Wen Q Y,Jin Z,et al.Cryptanalysis and improvement of a certificateless aggregate signature scheme[J].Information Sciences,2015,295:337-346.