PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

An efficient provably secure certificateless aggregate signature applicable to mobile computation

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
PL
Abstrakty
EN
An aggregate signature scheme allows a public algorithm to aggregate n signatures on n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that the messages have been endorsed by all the signers. Certificateless aggregate signatures allow the signers to authenticate messages without suffering from the complex certificate management in the traditional public key cryptography or the key escrow problem in identity-based cryptography. In this paper, we present a new efficient certificateless aggregate signature scheme. Compared with up-to-date certificateless aggregate signatures, our scheme is equipped with a number of attracting features: (1) it is shown to be secure under the standard computational Diffie-Hellman assumption in the random oracle model; (2) the security is proven in the strongest security model so far; (3) the signers do not need to be synchronized; and (4) its performance is comparable to the most efficient up-to-date schemes. These features are desirable in a mobile networking and computing environment where the storage/ computation capacity of the end devices are limited, and due to the wireless connection and distributed feature, the computing devices are easy to be attacked and hard to be synchronized.
Rocznik
Strony
373--391
Opis fizyczny
Bibliogr. 33 poz.
Twórcy
autor
autor
autor
  • Key Laboratory of Network and Software Security Assurance, Institute of Software School of Electronics Engineering and Computer Science, Peking University Beijing, 100871, China, xionghu.uestc@gmail.com
Bibliografia
  • Ahn, J. H., Green, M. and Hohenberger, S. (2010) Synchronized Aggregate Signatures: New Definitions, Constructions and Applications. In: Proceedings of the 17th ACM Computer and Communications Security (CCS 2010), Chicago, Illinois, USA. ACM Press, 473-484.
  • Al.-Riyami, S.S. and Paterson, K. (2003) Certificateless Public Key Cryptography. Lecture Notes in Computer Science, 2894, 452-473.
  • Bagherzandi, A. and Jarecki, S. (2010) Identity-Based Aggregate and Multi-Signature Schemes Based on RSA. Lecture Notes in Computer Science, 6056, 480-498.
  • Boldyreva, A., Gentry, C., O’neill, A. and Yum, D. H. (2007)Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), Alexandria, Virginia, USA, 276-285.
  • Boneh, D., Gentry, C., Lynn, B. and Shacham, H. (2003)Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Lecture Notes in Computer Science, 2656, 416-432.
  • Castro, R. and Dahab, R. (2007) Efficient Certificateless Signatures Suitable for Aggregation. [Online]. Retrieval Date: 1 December, 2011. Available from: http://eprint.iacr.org/2007/454.pdf
  • Cheng, X., Liu, J. and Wang, X. (2005)Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing. Lecture Notes in Computer Science, 3483, 1046-1054.
  • Choi, K. Y., Park, J. H., Huang, J. Y. and Lee, D. H. (2007) Efficient Certificateless Signature Schemes. Lecture Notes in Computer Science, 4521, 443-458.
  • Choi, K. Y., Park, J. H. and Lee, D. H. (2011) A New Provably Secure Certificateless Short Signature Scheme. Computers and Mathematics with Applications, 61(7), 1760-1768.
  • European Parliament (2005)Legislative resolution on the proposal for a directive of the European Parliament and of the Council on the retention of data processed in connection with the provision of public electronic Communications services and amending Directive 2002/58/EC (COM(2005)0438C6-0293/2005 2005/0182(COD)).
  • Gentry, C. and Ramzan, Z. (2006) Identity-Based Aggregate Signatures. Lecture Notes in Computer Science, 3958, 257-273.
  • Gong, Z., Long, Y., Hong, X. and Chen, K. (2007) Two Certificateless Aggregate Signatures from BilinearMaps. In: Proceedings of the 8th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD), Qingdao, China. IEEE, 188-193.
  • Gorantla, M.C. and Saxena, A. (2005) An Efficient Certificateless Signature Scheme. Lecture Notes in Computer Science, 3802, 110-116.
  • Herranz, J. (2006) Deterministic Identity-Based Signatures for Partial Aggregation. The Computer Journal, 49(3), 322-330.
  • Hu, B.C., Wong, D.S., Zhang, Z. and Deng, X. (2006)Key Replacement Attack Against a Generic Construction of Certificateless Signature. Lecture Notes in Computer Science, 4058, 235-246.
  • Huang, X.Y., Susilo, W., Mu Y. and Zhang, F. (2005) On the Security of Certificateless Signature Schemes from Asiacrypt 2003. Lecture Notes in Computer Science, 3810, 13-25.
  • Huang, X., Mu, Y., Susilo, W. Wong, D. S. and Wu, W. (2007) Certificateless Signature Revisited. Lecture Notes in Computer Science, 4586, 308-322.
  • Lu, S., Ostrovsky, R., Sahai, A., Shacham, H. and Waters, B. (2006) Sequential Aggregate Signatures and MultisignaturesWithout Random Oracles. Lecture Notes in Computer Science, 4004, 465-485.
  • Lysyanskaya, A., Micali, S., Reyzin, L. and Shacham, H. (2004)Sequential Aggregate Signatures from Trapdoor Permutations, Lecture Notes in Computer Science, 3027, 74-90.
  • Neven, G. (2008)Efficient Sequential Aggregate Signed Data. Lecture Notes in Computer Science, 4965, 52-69.
  • Shamir, A. (1984) Identity-Based Cryptosystems and Signature Schemes. Lecture Notes in Computer Science, 196, 47-53.
  • Shim, K. A. (2010)An ID-Based Aggregate Signature Scheme with Constant Pairing Computations. The Journal of Systems and Software, 83(10), 1873-1880.
  • Wu, Q., Domingo-Ferrer, J. and Gonzalez-Nicolas, U. (2010)Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications. IEEE Transactions on Vehicular Technology, 59(2), 559-573.
  • Wu, Q., Mu, Y., Susilo, W., Qin, B. and Domingo-Ferrer, J. (2009) Asymmetric Group Key Agreement. Lecture Notes in Computer Science, 5479, 153-170.
  • Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., and Farràs, O. (2011) Bridging Broadcast Encryption and Group Key Agreement. Lecture Notes in Computer Science, 7073, 143-160.
  • Xiong, H., Wu, Q. and Chen, Z. (2011)Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation. In: Proceedings of the 3rd International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan. IEEE, 92-99.
  • Xu, J., Zhang, Z. and Feng, D. (2005)ID-based Aggregate Signatures from Bilinear Pairings, Lecture Notes in Computer Science, 3810, 110-119.
  • Yum, D. H. and Lee, P. J. (2004)Generic Construction of Certificateless Signature. Lecture Notes in Computer Science, 3108, 200-211.
  • Zhang, Z. and Wong, D. (2006)Certificateless Public-Key Signature: Security Model and Efficient Construction. Lecture Notes in Computer Science, 3989, 293-308.
  • Zhang, L. and Zhang. F. (2008)A New Provably Secure Certificateless Signature Scheme. Proceedings of the International Conference on Communications (ICC 2008), Beijing, China. IEEE, 1685-1689.
  • Zhang, L. and Zhang, F. (2009)A New Certificateless Aggregate Signature Scheme. Computer Communications, 32(6), 1079-1085.
  • Zhang, L., Qin, B., Wu, Q. and Zhang, F. (2010) Efficient Many-to-One Authentication with Certificateless Aggregate Signatures. Computer Networks, 54(14), 2482-2491.
  • Zhang, L., Wu, Q., Solanas, A. and Domingo-Ferrer, J. (2010)A Scalable Robust Authentication Protocol for Secure Vehicular Communications. IEEE Transactions on Vehicular Technology, 59(4), 1606-1617.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATC-0009-0051
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.