Open Access
2012 On the Security of Some Aggregate Signature Schemes
Baoyuan Kang
J. Appl. Math. 2012: 1-13 (2012). DOI: 10.1155/2012/416137

Abstract

Aggregate signature scheme proposed by Boneh, Gentry, Lynn, and Shacham allows n signatures on n distinct messages from n distinct users to aggregate a single signature that convince any verifier that n users did indeed sign the n messages, respectively. The main benefit of such schemes is that they allow bandwidth and computational savings. In this paper, we question about whether the existing aggregate signature schemes satisfy the basic property that they can convince any verifier that every user indeed signed the message which should be signed by him. We show that Rückert et al.’s scheme, and Shim’s scheme do not satisfy the property. As a comparison, we investigate Boneh et al.’s scheme and show that under the assumption that each signer correctly signs one message, Boneh et al.’s scheme satisfies this property under two users' setting. Furthermore, we propose the concept of inside attack on aggregate signatures and give an improved aggregate signature scheme based on Shim’s scheme. We also prove that the improved scheme is secure against inside attack.

Citation

Download Citation

Baoyuan Kang. "On the Security of Some Aggregate Signature Schemes." J. Appl. Math. 2012 1 - 13, 2012. https://doi.org/10.1155/2012/416137

Information

Published: 2012
First available in Project Euclid: 5 April 2013

zbMATH: 1266.94026
MathSciNet: MR3005209
Digital Object Identifier: 10.1155/2012/416137

Rights: Copyright © 2012 Hindawi

Vol.2012 • 2012
Back to Top