Full text

Turn on search term navigation

Copyright © 2012 Baoyuan Kang. Baoyuan Kang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Aggregate signature scheme proposed by Boneh, Gentry, Lynn, and Shacham allows nsignatures on ndistinct messages from ndistinct users to aggregate a single signature that convince any verifier that nusers did indeed sign the nmessages, respectively. The main benefit of such schemes is that they allow bandwidth and computational savings. In this paper, we question about whether the existing aggregate signature schemes satisfy the basic property that they can convince any verifier that every user indeed signed the message which should be signed by him. We show that Rückert et al.'s scheme, and Shim's scheme do not satisfy the property. As a comparison, we investigate Boneh et al.'s scheme and show that under the assumption that each signer correctly signs one message, Boneh et al.'s scheme satisfies this property under two users' setting. Furthermore, we propose the concept of inside attack on aggregate signatures and give an improved aggregate signature scheme based on Shim's scheme. We also prove that the improved scheme is secure against inside attack.

Details

Title
On the Security of Some Aggregate Signature Schemes
Author
Kang, Baoyuan
Publication year
2012
Publication date
2012
Publisher
John Wiley & Sons, Inc.
ISSN
1110757X
e-ISSN
16870042
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
1272877814
Copyright
Copyright © 2012 Baoyuan Kang. Baoyuan Kang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.