Aggregate signature can combine n signatures on n messages from n users into single signature, and the verifier should be convinced by the aggregate signature that n users indeed sign n messages. Since aggregate signature can greatly reduce the length of total signature and the cost of verification, it is widely used in environments with low bandwidth communication, low storage and low computability. Recently, Liu et al. [H Liu, S Wang, M Liang and Y Chen, “New Construction of Efficient Certificateless Aggregate Signatures”, International Journal of Security and Its Applications Vol.8, No.1 (2014), pp. 411-422] proposed an efficient certificateless aggregate signature scheme which is proven existentially unforgeable against adaptive chosen-message attacks. Unfortunately, Liu et al.’s new certificateless signature scheme is insecure. In this paper, giving concrete and simple attacks, we demonstrate that type II adversary key generation center can make ordinary-passive attack and malicious-active attack to forge legal certificateless signatures and certificateless aggregate signatures on any messages. Furthermore, we analyze possible reasons why key generation center succeeds in ordinary-passive attack and malicious-active attack.
목차
Abstract 1. Introduction 2. Preliminaries 2.1. Bilinear Pairing 2.2. Computational Diffie–Hellman Problem 2.3. Component of Certificateless Aggregate Signature Scheme 2.4. Adversaries Model of Certificateless Aggregate Signature 3. Review of Liu et al.’s Certificateless Aggregate Signature Scheme 4. Security-Analysis of Liu et al’s Scheme 5. Analysis of Possible Reasons 6. Conclusions Acknowledgments References
키워드
Certificateless cryptographyAggregate signaturekey generation center attack
저자
Yulei Zhang [ College of Computer Science and Engineering, Northwest Normal University Lanzhou, 730070, P.R. China ]
Caifen Wang [ College of Computer Science and Engineering, Northwest Normal University Lanzhou, 730070, P.R. China ]
corresponding author
보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Security and Its Applications
간기
격월간
pISSN
1738-9976
수록기간
2008~2016
등재여부
SCOPUS
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.9 No.1