Volume 30 Issue 5
Sep.  2021
Turn off MathJax
Article Contents
ZHAI Jiaqi, LIU Jian, CHEN Lusheng. Extraction Security of Sequential Aggregate Signatures[J]. Chinese Journal of Electronics, 2021, 30(5): 885-894. doi: 10.1049/cje.2021.06.011
Citation: ZHAI Jiaqi, LIU Jian, CHEN Lusheng. Extraction Security of Sequential Aggregate Signatures[J]. Chinese Journal of Electronics, 2021, 30(5): 885-894. doi: 10.1049/cje.2021.06.011

Extraction Security of Sequential Aggregate Signatures

doi: 10.1049/cje.2021.06.011
Funds:

This work is supported by the National Natural Science Foundation of China (No.61902276) and National Key Research and Development Program of China (No.2018YFA0704703).

  • Received Date: 2019-05-08
  • Aggregate signature schemes enable anyone to compress many signatures into one. Besides the unforgeability of aggregate signature, another property called aggregate extraction sometimes is useful. In sequential aggregate signature schemes, the aggregate signature is computed incrementally by the signers. We introduce extraction security in the sequential context which can be seen as an analogy of aggregate extraction introduced by Boneh et al. in CRYPTO 2003. In addition to the practical meaning, it also has benefits in the construction of hierarchical identity-based signatures as we will point out. We study several well known aggregate signature schemes and prove some of them satisfy extraction security.
  • loading
  • D. Boneh, C. Gentry, B. Lynn, et al., "Aggregate and verifiably encrypted signatures from bilinear maps", Advances in Cryptology-CRYPTO'03, Lecture Notes in Computer Science, Vol.2656, pp.416-432, 2003.
    S. Kent, C. Lynn and K. Seo, "Secure border gateway protocol (S-BGP)", IEEE Journal on Selected Areas in Communications, Vol.18, No.4, pp.582-592, 2000.
    W.F. Zhang, L.T. Lei, X.M. Wang, et al., "Secure and efficient authentication and key agreement protocol using certificateless aggregate signature for cloud service oriented VANET", Acta Electronica Sinica, Vol.48, No.9, pp.1814-1823, 2020.
    Y. Xu, L.S. Huang, M.M. Tian, et al., "A provably secure and compact certificateless aggregate signature scheme", In:Acta Electronica Sinica, Vol.44, No.8, pp.1845-1850, 2016.
    J. H. Ahn, M. Green and S. Hohenberger, "Synchronized aggregate signatures:New definitions, constructions and applications", Proceedings of the 17th ACM Conference on Computer and Communications Security, pp.473-484, 2010.
    M. Bellare, C. Namprempre and G. Neven, "Unrestricted aggregate signatures", ICALP'07, Lecture Notes in Computer Science, Vol.2656, pp.411-422, 2007.
    C. Gentry, A. O'Neill and L. Reyzin, "A unified framework for trapdoor-permutation-based sequential aggregate signatures", PKC'18, Lecture Notes in Computer Science, Vol.10770, pp.34-57, 2018.
    C. Gentry and Z. Ramzan, "Identity-based aggregate signatures", PKC'06, Lecture Notes in Computer Science, Vol.3958, pp.257-273, 2006.
    S. Hohenberger and B. Waters, "Synchronized aggregate signatures from the RSA assumption", Advances in Cryptology-EUROCRYPT'18, Lecture Notes in Computer Science, Vol.10821, pp.197-229, 2018.
    A. Lysyanskaya, S. Micali, L. Reyzin, et al., "Sequential aggregate signatures from trapdoor permutations", Advances in Cryptology-CRYPTO'04, Lecture Notes in Computer Science, Vol.3027, pp.74-90, 2004.
    S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, et al., "Sequential aggregate signatures and multisignatures without random oracles", Advances in Cryptology-CRYPTO'06, Lecture Notes in Computer Science, Vol.4004, pp.465-485, 2006.
    G. Neven, "Efficient sequential aggregate signed data", Advances in Cryptology-EUROCRYPT'08, Lecture Notes in Computer Science, Vol.4965, pp.52-69, 2008.
    B. Waters, "Efficient identity-based encryption without random oracles", Advances in Cryptology-EUROCRYPT'05, Lecture Notes in Computer Science, Vol.3494, pp.114-127, 2005.
    M. Bellare, C. Namprempre and G. Neven, "Security proofs for identity-based identification and signature schemes", Advances in Cryptology-EUROCRYPT'04, Lecture Notes in Computer Science, Vol.3027, pp.268-286, 2004.
    D. Boneh, B. Lynn and H. Shacham, "Short signatures from the Weil pairing", Advances in Cryptology-ASIACRYPT'01, Lecture Notes in Computer Science, Vol.2248, pp.514-532, 2001.
    C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography", Advances in Cryptology-ASIACRYPT'02, Lecture Notes in Computer Science, Vol.2501, pp.548-566, 2002.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (82) PDF downloads(14) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return