Skip to main content

Efficient Certificate-Based Signature and Its Aggregation

  • Conference paper
  • First Online:
Information Security Practice and Experience (ISPEC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10701))

Abstract

The certificate-based cryptography is proposed to eliminate the key escrow problem of ID-based public key cryptography and simplify certificate management procedures of traditional public key infrastructure (PKI) in the same time. Since its invention, many certificate-based signature have been proposed. However, the existing schemes either only support partial aggregateability, or require a pre-negotiated one-time-use nonce. To solve this problem, in this paper, we propose a new certificate-based signature scheme where signatures on the same message signed by different users can be aggregated into a single signature without the pre-negotiated one-time-use nonce. Furthermore, verification in our proposal only involves four pairing operations. Our proposed certificate-based (aggregate) signature scheme can be considered as the combination of Gentry-Ramzan identity-based aggregate signature scheme and Boneh-Lynn-Shacham short signature scheme. Similar to their schemes, our proposal can be also proven secure in the random oracle model based on the computational Diffie-Hellman assumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29

    Chapter  Google Scholar 

  2. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  3. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_30

    Chapter  Google Scholar 

  4. Chen, J.N., Chen, Q.S., Zou, F.M.: Certificate-based aggregate signature scheme without bilinear pairings. J. Inf. Hid. Multimedia Sig. Process. 7(6), 1330–1336 (2016)

    Google Scholar 

  5. Chen, Y.-C., Tso, R., Mambo, M., Huang, K., Horng, G.: Certificateless aggregate signature with efficient verification. Secur. Commun. Netw. 8(13), 2232–2243 (2015)

    Article  Google Scholar 

  6. Cheng, L., Xiao, Y., Wang, G.: Cryptanalysis of a certificate-based on signature scheme. Proc. Eng. 29(4), 2821–2825 (2012)

    Article  Google Scholar 

  7. Feng, J., Li, J.: A new certificate-based digital signature scheme. In: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 547–549 (2013)

    Google Scholar 

  8. Feng, J., Li, J.: A new certificate-based digital signature scheme in bilinear group. Int. J. Embed. Syst. 6(1), 44–49 (2014)

    Article  Google Scholar 

  9. Floerkemeier, C., Langheinrich, M., Fleisch, E., Mattern, F., Sarma, S.E. (eds.): IOT 2008. LNCS, vol. 4952. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78731-0

    Google Scholar 

  10. Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-39200-9_17

    Chapter  Google Scholar 

  11. Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 257–273. Springer, Heidelberg (2006). https://doi.org/10.1007/11745853_17

    Chapter  Google Scholar 

  12. Gong, Z., Long, Y., Hong, X., Chen, K.: Two certificateless aggregate signatures from bilinear maps. In: SNPD, vol. 3, pp. 188–193. IEEE Computer Society (2007)

    Google Scholar 

  13. He, D., Tian, M., Chen, J.: Insecurity of an efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 268, 458–462 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  14. Kang, B., Mu, W., Jing, D.: An efficient certificateless aggregate signature scheme. Wuhan Univ. J. Nat. Sci. 22(2), 165–170 (2017)

    Article  MathSciNet  Google Scholar 

  15. Kang, B.G., Park, J.H., Hahn, S.G.: A certificate-based signature scheme. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 99–111. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24660-2_8

    Chapter  Google Scholar 

  16. Wu, Q., Zhang, F., Zhang, L., Qin, B.: Efficient many-to-one authentication with certificateless aggregate signatures. Comput. Netw. 54, 2481–2491 (2010)

    MATH  Google Scholar 

  17. Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-based signature: security model and efficient construction. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 110–125. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73408-6_8

    Chapter  Google Scholar 

  18. Li, J., Huang, X., Yi, M., Susilo, W., Wu, Q.: Constructions of certificate-based signature secure against key replacement attacks. J. Comput. Secur. 18(3), 421–449 (2010)

    Article  Google Scholar 

  19. Li, J., Huang, X., Zhang, Y., Xu, L.: An efficient short certificate-based signature scheme. J. Syst. Softw. 85(2), 314–322 (2012)

    Article  Google Scholar 

  20. Li, J., Wang, Z., Zhang, Y.: Provably secure certificate-based signature scheme without pairings. Inf. Sci. 233, 313–320 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  21. Liu, H., Liang, M., Sun, H.: A secure and efficient certificateless aggregate signature scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E97.A(4), 991–995 (2014)

    Google Scholar 

  22. Liu, J.K., Baek, J., Susilo, W., Zhou, J.: Certificate-based signature schemes without pairings or random oracles. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 285–297. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85886-7_20

    Chapter  Google Scholar 

  23. Liu, J.K., Baek, J., Zhou, J.: Certificate-based sequential aggregate signature. In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, 16–19 March 2009, pp. 21–28 (2009)

    Google Scholar 

  24. Liu, J.K., Bao, F., Zhou, J.: Short and efficient certificate-based signature. In: Casares-Giner, V., Manzoni, P., Pont, A. (eds.) NETWORKING 2011. LNCS, vol. 6827, pp. 167–178. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23041-7_17

    Chapter  Google Scholar 

  25. Yang, L., Li, J.: Improved certificate-based signature scheme without random oracles. IET Inf. Secur. 10(2), 80–86 (2016)

    Article  MathSciNet  Google Scholar 

  26. Malhi, A.K., Batra, S.: An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discrete Math. Theor. Comput. Sci. 17(1), 317–338 (2015)

    MathSciNet  MATH  Google Scholar 

  27. Nie, H., Li, Y., Chen, W., Ding, Y.: NCLAS: a novel and efficient certificateless aggregate signature scheme. Secur. Commun. Netw. 9(16), 3141–151 (2016)

    Article  Google Scholar 

  28. Pakniat, N., Noroozi, M.: Cryptanalysis of a certificateless aggregate signature scheme. In: The 9th Conference of Command, Control, Communications and Computer Intelligence (2016)

    Google Scholar 

  29. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  30. Shen, H., Chen, J., Hu, H., Shen, J.: Insecurity of a certificateless aggregate signature scheme. IEICE Trans. Fund. Electron. Commun. Comput. Sci. E99.A(2), 660–662 (2014)

    Google Scholar 

  31. Shen, H., Chen, J., Shen, J., He, D.: Cryptanalysis of a certificateless aggregate signature scheme with efficient verification. Secur. Commun. Netw. 9(13), 2217–2221 (2016)

    Google Scholar 

  32. Shim, K.-A.: On the security of a certificateless aggregate signature scheme. IEEE Commun. Lett. 15(8), 1136–1138 (2011)

    Article  Google Scholar 

  33. Tu, H., He, D., Huang, B.: Reattack of a certificateless aggregate signature scheme with constant pairing computations. Sci. World J. 10 pages (2014). Article ID 343715

    Google Scholar 

  34. Chen, K., Wang, X., Gao, W., Wang, G.: Generic construction of certificate-based signature from certificateless signature with provable security. Informatica 28(2), 215–235 (2017)

    Article  MathSciNet  Google Scholar 

  35. Wu, W., Mu, Y., Susilo, W., Huang, X.: Certificate-based signatures: new definitions and a generic construction from certificateless signatures. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 99–114. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00306-6_8

    Chapter  Google Scholar 

  36. Wei, W., Yi, M., Susilo, W., Huang, X.: Certificate-based signatures revisited. J. UCS 15(8), 1659–1684 (2009)

    MATH  Google Scholar 

  37. Xiong, H., Guan, Z., Chen, Z., Li, F.: An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219, 225–235 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  38. Wang, Y., Ming, Y.: Efficient certificate-based signature scheme. In: Fifth International Conference on Information Assurance and Security, pp. 87–90 (2009)

    Google Scholar 

  39. Zhang, H.: Insecurity of a certificateless aggregate signature scheme. Secur. Commun. Netw. 9(11), 1547–1552 (2016)

    Article  Google Scholar 

  40. Zhang, J.: On the security of a certificate-based signature scheme and its improvement with pairings. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 47–58. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00843-6_5

    Chapter  Google Scholar 

  41. Zhang, J., Zhao, X., Mao, J.: Attack on chen et al.’s certificateless aggregate signature scheme. Secur. Commun. Netw. 9(1), 54–59 (2016)

    Article  Google Scholar 

  42. Zhang, L., Zhang, F.: A new certificateless aggregate signature scheme. Comput. Commun. 32(6), 1079–1085 (2009)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgement

Xinxin Ma and Jun Shao were supported in part by the National Natural Science Foundation of China under Grant 61472364, Grant 61472365, and Grant 61379121, and in part by the Science Plan Project of Zhejiang under Grant 2017C01091. Cong Zuo was supported by Data61 Research Collaborative Project (Enhancing Security and Privacy in IoT).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Shao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ma, X., Shao, J., Zuo, C., Meng, R. (2017). Efficient Certificate-Based Signature and Its Aggregation. In: Liu, J., Samarati, P. (eds) Information Security Practice and Experience. ISPEC 2017. Lecture Notes in Computer Science(), vol 10701. Springer, Cham. https://doi.org/10.1007/978-3-319-72359-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72359-4_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72358-7

  • Online ISBN: 978-3-319-72359-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics