Efficient and Provide Security Certificateless Aggregate Signature Scheme
Author:
Affiliation:

Fund Project:

National Natural Science Foundation of China (61272436, 61402275, 61303092, 61572303); Foundation of State Key Laboratory of Information Security, IIE CAS (2015-MS-10); Foundation of Science and Technology on Communication Security Laboratory (9140C110206140C11050); National Natural Science Foundation of Shaanxi Province (2014JQ8309); Fundamental Research Funds for the Central Universities (GK201504016, 20130205)

  • Article
  • | |
  • Metrics
  • |
  • Reference [23]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    Almost all existing aggregate signature schemes are based on bilinear pairing which leads to high computational cost. In order to solve this problem under different network environment, two new certificateless aggregate signature schemes without bilinear pairing CLAS-Ⅰ and CLAS-Ⅱ are proposed in this paper. The proposed schemes are provably unforgeable in the random oracle model under the discrete logarithm assumption, and also have the security properties of public verifiability. Moreover, compared with other existing aggregate signature schemes in the computationally complexity, the proposal are more efficient. Meanwhile, the scheme CLAS-Ⅰ can be used for high bandwidth network environment because the length of signature is long, and the scheme CLAS-Ⅱ can be used in a narrow bandwidth network environment since it is the shortest certificateless aggregate signature and the number of users does not correlate to the length of the signatures generated by CLAS-Ⅱ,.

    Reference
    [1] Shamir A. Identity-Based cryptosystems and signature schemes. In:Proc. of the Advances in Cryptology-Crypto'84. MLNCS 196, Berlin:Springer-Verlag, 1985. 47-53.[doi:10.1007/3-540-39568-7_5]
    [2] Al-Riyami SS, Paterson KG. Certificateless public key cryptography. In:Proc. of the Asiacryft 2003. LNCS 2894, Berlin:SpringerVerlag, 2003. 452-473.[doi:10.1007/978-3-540-40061-5_29]
    [3] Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In:Proc. of the Cryptology- Eurocrypt. Berlin:Springer-Verlag, 2003. 416-432.[doi:10.1007/3-540-39200-9_26]
    [4] Yang T, Kong LB, Hu JB, Chen Z. Survey on aggregate signature and its applications. Journal of Computer Research and Development, 2012,49(S2):192-199(in Chinese with English abstract).
    [5] Gong Z, Long Y, Hong X, Chen KF. Two certificateless aggregate signatures from bilinear maps. In:Proc. of the IEEESNPD 2007. IEEE, 2007. 188-193.[doi:10.1109/SNPD.2007.132]
    [6] Zhang L, Zhang FT. A new certificateless aggregate signature scheme. Computer Communications, 2009,32(6):1079-1085.[doi:10.1016/j.comcom.2008.12.042]
    [7] Zhang L, Qin B, Wu QH, Zhang FT. Efficient many-to-one authentication with certificateless aggregate signatures. Computer Networks, 2010,54(14):2482-2491.[doi:10.1016/j.comnet.2010.04.008]
    [8] Wang Z, Wu Q, Ye DF, Chen HY. Practical identity-based aggregate signature scheme from bilinear maps. Shanghai Jiaotong University Press, 2008,13(6):684-687.[doi:10.1007/s12204-008-0684-5]
    [9] Wen YL, Ma JF. An aggregate signature scheme with constant pairing operations. IEEE Computer Society, 2008,CSSE(3):830-833.[doi:10.1109/CSSE.2008.941]
    [10] Selvi SSD, Vivek SS, Shriram J, Kalaivani S, Rangan CP. Security analysis of aggregate signature and batch verification signature schemes. Cryptology ePrint Archive. https://eprint.iacr.org/2009/290.pdf[doi:10.1109/INCoS.2011.151]
    [11] Xiong H, Wu QH, Chen Z. Strong security enabled certificateless aggregate signatures applicable to mobile computation. In:Proc. of the 20113rd Int'l Conf. on Intelligent Networking and Collaborative Systems. IEEE, 2011.
    [12] Shen LM, Sun YX. On security of a certicateless aggregate signature scheme. Cryptology ePrint Archive. https://eprint.iacr.org/2012/152.pdf
    [13] Xiong H, Guan Z, Chen Z, Li F. An efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 2013,219:225-235.[doi:10.1016/j.ins.2012.07.004]
    [14] Cheng L, Wen QY, Jin ZP, Zhang H, Zhou LM. On the security of a certificateless aggregate signature scheme. Cryptology ePrint Archive. http://eprint.iacr.org/2013/093.pdf
    [15] He DB, Tian MM, Chen JH. A note on 'An efficient certificateless aggregate signature with constant pairing computations'. http://eprint.iacr.org/2012/445.pdf
    [16] Du HZ, Huang MJ, Wen QY. Efficient and provably-secure certificateless aggregate signature scheme. Acta Electronica Sinica, 2013,41(1):74-76(in Chinese with English abstract).
    [17] Liu H, Wang SJ, Liang MG, Chen YQ. New construction of efficient certificateless aggregate signatures. Int'l Journal of Security and its Applications, 2014,8(1):411-422.[doi:10.14257/ijsia.2014.8.1.38]
    [18] Chen YC, Horng G, Liu CL, Tsai YY, Chan CS. Efficient certificateless aggregate signature scheme. Journal of Electronic Science and Technology, 2012,10(3):209-214.[doi:10.3969/j.issn.1674-862X.2012.03.004]
    [19] Gong Z, Long Y, Hong X, Chen KF. Practical certificateless aggregate signatures from bilinear maps. Journal of Information Science and Engineering, 2008.
    [20] Chen L, Cheng Z, Smart NP. Identity-Based key agreement protocols from pairings. Journal of Information Security, 2007,6(4):213-241.[doi:10.1007/s10207-006-0011-9]
    附中文参考文献:
    [4] 杨涛,孔令波,胡建斌,陈钟.聚合签名及其应用研究综述.计算机研究与发展,2012,49(S2):192-199.
    [16] 杜红珍,黄梅娟,温巧燕.高效的可证明安全的无证书聚合签名方案.电子学报,2013,41(1):74-76.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

周彦伟,杨波,张文政.高效可证安全的无证书聚合签名方案.软件学报,2015,26(12):3204-3214

Copy
Share
Article Metrics
  • Abstract:2764
  • PDF: 5903
  • HTML: 1218
  • Cited by: 0
History
  • Received:December 19,2014
  • Revised:February 15,2015
  • Online: December 04,2015
You are the first2032442Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063