On the Security of Some Aggregate Signature Schemes

Aggregate signature scheme proposed by Boneh, Gentry, Lynn, and Shacham allows n signatures on n distinct messages from n distinct users to aggregate a single signature that convince any verifier that n users did indeed sign the n messages, respectively. The main benefit of such schemes is that they...

Full description

Saved in:
Bibliographic Details
Main Author: Baoyuan Kang
Format: Article
Language:English
Published: Wiley 2012-01-01
Series:Journal of Applied Mathematics
Online Access:http://dx.doi.org/10.1155/2012/416137
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850223649129234432
author Baoyuan Kang
author_facet Baoyuan Kang
author_sort Baoyuan Kang
collection DOAJ
description Aggregate signature scheme proposed by Boneh, Gentry, Lynn, and Shacham allows n signatures on n distinct messages from n distinct users to aggregate a single signature that convince any verifier that n users did indeed sign the n messages, respectively. The main benefit of such schemes is that they allow bandwidth and computational savings. In this paper, we question about whether the existing aggregate signature schemes satisfy the basic property that they can convince any verifier that every user indeed signed the message which should be signed by him. We show that Rückert et al.’s scheme, and Shim’s scheme do not satisfy the property. As a comparison, we investigate Boneh et al.’s scheme and show that under the assumption that each signer correctly signs one message, Boneh et al.’s scheme satisfies this property under two users' setting. Furthermore, we propose the concept of inside attack on aggregate signatures and give an improved aggregate signature scheme based on Shim’s scheme. We also prove that the improved scheme is secure against inside attack.
format Article
id doaj-art-43efaf0258b14037b59e49b01d30bf20
institution OA Journals
issn 1110-757X
1687-0042
language English
publishDate 2012-01-01
publisher Wiley
record_format Article
series Journal of Applied Mathematics
spelling doaj-art-43efaf0258b14037b59e49b01d30bf202025-08-20T02:05:52ZengWileyJournal of Applied Mathematics1110-757X1687-00422012-01-01201210.1155/2012/416137416137On the Security of Some Aggregate Signature SchemesBaoyuan Kang0School of Computer Science and Software, Tianjin Polytechnic University, Tianjin 300387, ChinaAggregate signature scheme proposed by Boneh, Gentry, Lynn, and Shacham allows n signatures on n distinct messages from n distinct users to aggregate a single signature that convince any verifier that n users did indeed sign the n messages, respectively. The main benefit of such schemes is that they allow bandwidth and computational savings. In this paper, we question about whether the existing aggregate signature schemes satisfy the basic property that they can convince any verifier that every user indeed signed the message which should be signed by him. We show that Rückert et al.’s scheme, and Shim’s scheme do not satisfy the property. As a comparison, we investigate Boneh et al.’s scheme and show that under the assumption that each signer correctly signs one message, Boneh et al.’s scheme satisfies this property under two users' setting. Furthermore, we propose the concept of inside attack on aggregate signatures and give an improved aggregate signature scheme based on Shim’s scheme. We also prove that the improved scheme is secure against inside attack.http://dx.doi.org/10.1155/2012/416137
spellingShingle Baoyuan Kang
On the Security of Some Aggregate Signature Schemes
Journal of Applied Mathematics
title On the Security of Some Aggregate Signature Schemes
title_full On the Security of Some Aggregate Signature Schemes
title_fullStr On the Security of Some Aggregate Signature Schemes
title_full_unstemmed On the Security of Some Aggregate Signature Schemes
title_short On the Security of Some Aggregate Signature Schemes
title_sort on the security of some aggregate signature schemes
url http://dx.doi.org/10.1155/2012/416137
work_keys_str_mv AT baoyuankang onthesecurityofsomeaggregatesignatureschemes