On the Security of Some Aggregate Signature Schemes
Aggregate signature scheme proposed by Boneh, Gentry, Lynn, and Shacham allows n signatures on n distinct messages from n distinct users to aggregate a single signature that convince any verifier that n users did indeed sign the n messages, respectively. The main benefit of such schemes is that they...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2012-01-01
|
| Series: | Journal of Applied Mathematics |
| Online Access: | http://dx.doi.org/10.1155/2012/416137 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850223649129234432 |
|---|---|
| author | Baoyuan Kang |
| author_facet | Baoyuan Kang |
| author_sort | Baoyuan Kang |
| collection | DOAJ |
| description | Aggregate signature scheme proposed by Boneh, Gentry, Lynn, and Shacham allows n signatures on n distinct messages from n distinct users to aggregate a single signature that convince any verifier that n users did indeed sign the n messages, respectively. The main benefit of such schemes is that they allow bandwidth and computational savings. In this paper, we question about whether the existing aggregate signature schemes satisfy the basic property that they can convince any verifier that every user indeed signed the message which should be signed by him. We show that Rückert et al.’s scheme, and Shim’s scheme do not satisfy the property. As a comparison, we investigate Boneh et al.’s scheme and show that under the assumption that each signer correctly signs one message, Boneh et al.’s scheme satisfies this property under two users' setting. Furthermore, we propose the concept of inside attack on aggregate signatures and give an improved aggregate signature scheme based on Shim’s scheme. We also prove that the improved scheme is secure against inside attack. |
| format | Article |
| id | doaj-art-43efaf0258b14037b59e49b01d30bf20 |
| institution | OA Journals |
| issn | 1110-757X 1687-0042 |
| language | English |
| publishDate | 2012-01-01 |
| publisher | Wiley |
| record_format | Article |
| series | Journal of Applied Mathematics |
| spelling | doaj-art-43efaf0258b14037b59e49b01d30bf202025-08-20T02:05:52ZengWileyJournal of Applied Mathematics1110-757X1687-00422012-01-01201210.1155/2012/416137416137On the Security of Some Aggregate Signature SchemesBaoyuan Kang0School of Computer Science and Software, Tianjin Polytechnic University, Tianjin 300387, ChinaAggregate signature scheme proposed by Boneh, Gentry, Lynn, and Shacham allows n signatures on n distinct messages from n distinct users to aggregate a single signature that convince any verifier that n users did indeed sign the n messages, respectively. The main benefit of such schemes is that they allow bandwidth and computational savings. In this paper, we question about whether the existing aggregate signature schemes satisfy the basic property that they can convince any verifier that every user indeed signed the message which should be signed by him. We show that Rückert et al.’s scheme, and Shim’s scheme do not satisfy the property. As a comparison, we investigate Boneh et al.’s scheme and show that under the assumption that each signer correctly signs one message, Boneh et al.’s scheme satisfies this property under two users' setting. Furthermore, we propose the concept of inside attack on aggregate signatures and give an improved aggregate signature scheme based on Shim’s scheme. We also prove that the improved scheme is secure against inside attack.http://dx.doi.org/10.1155/2012/416137 |
| spellingShingle | Baoyuan Kang On the Security of Some Aggregate Signature Schemes Journal of Applied Mathematics |
| title | On the Security of Some Aggregate Signature Schemes |
| title_full | On the Security of Some Aggregate Signature Schemes |
| title_fullStr | On the Security of Some Aggregate Signature Schemes |
| title_full_unstemmed | On the Security of Some Aggregate Signature Schemes |
| title_short | On the Security of Some Aggregate Signature Schemes |
| title_sort | on the security of some aggregate signature schemes |
| url | http://dx.doi.org/10.1155/2012/416137 |
| work_keys_str_mv | AT baoyuankang onthesecurityofsomeaggregatesignatureschemes |