Abstract
The certificate-based cryptography is proposed to eliminate the key escrow problem of ID-based public key cryptography and simplify certificate management procedures of traditional public key infrastructure (PKI) in the same time. Since its invention, many certificate-based signature have been proposed. However, the existing schemes either only support partial aggregateability, or require a pre-negotiated one-time-use nonce. To solve this problem, in this paper, we propose a new certificate-based signature scheme where signatures on the same message signed by different users can be aggregated into a single signature without the pre-negotiated one-time-use nonce. Furthermore, verification in our proposal only involves four pairing operations. Our proposed certificate-based (aggregate) signature scheme can be considered as the combination of Gentry-Ramzan identity-based aggregate signature scheme and Boneh-Lynn-Shacham short signature scheme. Similar to their schemes, our proposal can be also proven secure in the random oracle model based on the computational Diffie-Hellman assumption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_30
Chen, J.N., Chen, Q.S., Zou, F.M.: Certificate-based aggregate signature scheme without bilinear pairings. J. Inf. Hid. Multimedia Sig. Process. 7(6), 1330–1336 (2016)
Chen, Y.-C., Tso, R., Mambo, M., Huang, K., Horng, G.: Certificateless aggregate signature with efficient verification. Secur. Commun. Netw. 8(13), 2232–2243 (2015)
Cheng, L., Xiao, Y., Wang, G.: Cryptanalysis of a certificate-based on signature scheme. Proc. Eng. 29(4), 2821–2825 (2012)
Feng, J., Li, J.: A new certificate-based digital signature scheme. In: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 547–549 (2013)
Feng, J., Li, J.: A new certificate-based digital signature scheme in bilinear group. Int. J. Embed. Syst. 6(1), 44–49 (2014)
Floerkemeier, C., Langheinrich, M., Fleisch, E., Mattern, F., Sarma, S.E. (eds.): IOT 2008. LNCS, vol. 4952. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78731-0
Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-39200-9_17
Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 257–273. Springer, Heidelberg (2006). https://doi.org/10.1007/11745853_17
Gong, Z., Long, Y., Hong, X., Chen, K.: Two certificateless aggregate signatures from bilinear maps. In: SNPD, vol. 3, pp. 188–193. IEEE Computer Society (2007)
He, D., Tian, M., Chen, J.: Insecurity of an efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 268, 458–462 (2014)
Kang, B., Mu, W., Jing, D.: An efficient certificateless aggregate signature scheme. Wuhan Univ. J. Nat. Sci. 22(2), 165–170 (2017)
Kang, B.G., Park, J.H., Hahn, S.G.: A certificate-based signature scheme. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 99–111. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24660-2_8
Wu, Q., Zhang, F., Zhang, L., Qin, B.: Efficient many-to-one authentication with certificateless aggregate signatures. Comput. Netw. 54, 2481–2491 (2010)
Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-based signature: security model and efficient construction. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 110–125. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73408-6_8
Li, J., Huang, X., Yi, M., Susilo, W., Wu, Q.: Constructions of certificate-based signature secure against key replacement attacks. J. Comput. Secur. 18(3), 421–449 (2010)
Li, J., Huang, X., Zhang, Y., Xu, L.: An efficient short certificate-based signature scheme. J. Syst. Softw. 85(2), 314–322 (2012)
Li, J., Wang, Z., Zhang, Y.: Provably secure certificate-based signature scheme without pairings. Inf. Sci. 233, 313–320 (2013)
Liu, H., Liang, M., Sun, H.: A secure and efficient certificateless aggregate signature scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E97.A(4), 991–995 (2014)
Liu, J.K., Baek, J., Susilo, W., Zhou, J.: Certificate-based signature schemes without pairings or random oracles. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 285–297. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85886-7_20
Liu, J.K., Baek, J., Zhou, J.: Certificate-based sequential aggregate signature. In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, 16–19 March 2009, pp. 21–28 (2009)
Liu, J.K., Bao, F., Zhou, J.: Short and efficient certificate-based signature. In: Casares-Giner, V., Manzoni, P., Pont, A. (eds.) NETWORKING 2011. LNCS, vol. 6827, pp. 167–178. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23041-7_17
Yang, L., Li, J.: Improved certificate-based signature scheme without random oracles. IET Inf. Secur. 10(2), 80–86 (2016)
Malhi, A.K., Batra, S.: An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discrete Math. Theor. Comput. Sci. 17(1), 317–338 (2015)
Nie, H., Li, Y., Chen, W., Ding, Y.: NCLAS: a novel and efficient certificateless aggregate signature scheme. Secur. Commun. Netw. 9(16), 3141–151 (2016)
Pakniat, N., Noroozi, M.: Cryptanalysis of a certificateless aggregate signature scheme. In: The 9th Conference of Command, Control, Communications and Computer Intelligence (2016)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Shen, H., Chen, J., Hu, H., Shen, J.: Insecurity of a certificateless aggregate signature scheme. IEICE Trans. Fund. Electron. Commun. Comput. Sci. E99.A(2), 660–662 (2014)
Shen, H., Chen, J., Shen, J., He, D.: Cryptanalysis of a certificateless aggregate signature scheme with efficient verification. Secur. Commun. Netw. 9(13), 2217–2221 (2016)
Shim, K.-A.: On the security of a certificateless aggregate signature scheme. IEEE Commun. Lett. 15(8), 1136–1138 (2011)
Tu, H., He, D., Huang, B.: Reattack of a certificateless aggregate signature scheme with constant pairing computations. Sci. World J. 10 pages (2014). Article ID 343715
Chen, K., Wang, X., Gao, W., Wang, G.: Generic construction of certificate-based signature from certificateless signature with provable security. Informatica 28(2), 215–235 (2017)
Wu, W., Mu, Y., Susilo, W., Huang, X.: Certificate-based signatures: new definitions and a generic construction from certificateless signatures. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 99–114. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00306-6_8
Wei, W., Yi, M., Susilo, W., Huang, X.: Certificate-based signatures revisited. J. UCS 15(8), 1659–1684 (2009)
Xiong, H., Guan, Z., Chen, Z., Li, F.: An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219, 225–235 (2012)
Wang, Y., Ming, Y.: Efficient certificate-based signature scheme. In: Fifth International Conference on Information Assurance and Security, pp. 87–90 (2009)
Zhang, H.: Insecurity of a certificateless aggregate signature scheme. Secur. Commun. Netw. 9(11), 1547–1552 (2016)
Zhang, J.: On the security of a certificate-based signature scheme and its improvement with pairings. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 47–58. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00843-6_5
Zhang, J., Zhao, X., Mao, J.: Attack on chen et al.’s certificateless aggregate signature scheme. Secur. Commun. Netw. 9(1), 54–59 (2016)
Zhang, L., Zhang, F.: A new certificateless aggregate signature scheme. Comput. Commun. 32(6), 1079–1085 (2009)
Acknowledgement
Xinxin Ma and Jun Shao were supported in part by the National Natural Science Foundation of China under Grant 61472364, Grant 61472365, and Grant 61379121, and in part by the Science Plan Project of Zhejiang under Grant 2017C01091. Cong Zuo was supported by Data61 Research Collaborative Project (Enhancing Security and Privacy in IoT).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ma, X., Shao, J., Zuo, C., Meng, R. (2017). Efficient Certificate-Based Signature and Its Aggregation. In: Liu, J., Samarati, P. (eds) Information Security Practice and Experience. ISPEC 2017. Lecture Notes in Computer Science(), vol 10701. Springer, Cham. https://doi.org/10.1007/978-3-319-72359-4_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-72359-4_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72358-7
Online ISBN: 978-3-319-72359-4
eBook Packages: Computer ScienceComputer Science (R0)