| Literature DB >> 30540746 |
Xiaodong Yang1, Jinli Wang1, Tingchun Ma1, Yutong Li1, Caifen Wang1.
Abstract
Certificateless aggregate signature (CLAS) is a crucial cryptosystem. It can not only compress multiple signatures into a short signature, but also ensure the validity of each signature participating in the aggregation by verifying the validity of an resulting aggregate signature. Therefore, a secure and efficient CLAS scheme is very useful for resource-constrained environments because it greatly reduces the overall length of the signature and the verifier's computational overhead. Cheng et al. presented an efficient CLAS scheme and proved its security in the random oracle model. However, we find that their scheme has security flaws. In this paper, we demonstrate that Cheng et al.'s CLAS scheme is vulnerable to coalition attacks from internal signers. To overcome these attacks, we present an improved CLAS scheme and prove that it is existentially unforgeable under the computational Diffie-Hellman assumption. In addition, our CLAS scheme can not only resist coalition attacks but also generate a very short aggregate signature. The performance analysis results show that our improved CLAS scheme is lower than the related CLAS schemes in terms of communication overhead and computation cost.Entities:
Mesh:
Year: 2018 PMID: 30540746 PMCID: PMC6291108 DOI: 10.1371/journal.pone.0205453
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Definition of some notations.
| Symbol | Definition |
|---|---|
| the overall length of an aggregate signature | |
| the computational cost of the algorithm | |
| the computational cost of the algorithm | |
| Can a scheme resist coalition attacks? | |
| the overall number of signers participating in the aggregation | |
| | | the length of an element in |
| the computational cost of a bilinear pairing operation | |
| the computational cost of an exponentiation calculation |
Performance comparison of some CLAS schemes.
| Scheme | Sign | AggVerify | Size | Coalition attack |
|---|---|---|---|---|
| Scheme of Cheng et al. [ | 3 | 3 | ( | No |
| Scheme of Zhang et al. [ | 2 | 2n | | | Yes |
| Scheme of Liu et al. [ | 3 | 3 | 2| | No |
| Scheme of Xiong et al. [ | 3 | 3 | ( | No |
| Scheme of He et al. [ | 3 | 3 | ( | No |
| Scheme of Du et al. [ | 4 | 4 | 2| | No |
| Scheme of Chen et al. [ | 4 | 4 | ( | No |
| Scheme of Chen et al. [ | 4 | 4 | 2| | No |
| Scheme of Kumar et al. [ | 4 | 3 | ( | No |
| Scheme of Li et al. [ | 4 | 3 | ( | No |
| Our scheme | | | Yes |
Fig 1Time cost of individual signature generation.
Fig 2Comparison of communication cost.
Fig 3Time cost of aggregate signature verification.