Security analysis of the unrestricted identity-based aggregate signature scheme.

PLoS One

Center for Information Security Technologies, Korea University, Seoul, Korea.

Published: April 2016

Aggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a short signature. An ideal aggregate signature scheme is an identity-based aggregate signature (IBAS) scheme that supports full aggregation since it can reduce the total transmitted data by using an identity string as a public key and anyone can freely aggregate different signatures. Constructing a secure IBAS scheme that supports full aggregation in bilinear maps is an important open problem. Recently, Yuan et al. proposed such a scheme and claimed its security in the random oracle model under the computational Diffie-Hellman assumption. In this paper, we show that there is an efficient forgery on their IBAS scheme and that their security proof has a serious flaw.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4436341PMC
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0128081PLOS

Publication Analysis

Top Keywords

aggregate signature
12
ibas scheme
12
identity-based aggregate
8
signature scheme
8
aggregate signatures
8
scheme supports
8
supports full
8
full aggregation
8
scheme
6
aggregate
5

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!