Efficient Unrestricted Identity-Based Aggregate Signature Scheme

An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation. However, among existing aggregate signature schemes in the identity-based setting, some of them fail to achieve constant-length aggregate signature or require a large amount of pairing operations which grows linearly with the number of signers, while others have some limitations on the aggregated signatures. The main challenge in building efficient aggregate signature scheme is to compress signatures into a compact, constant-length signature without any restriction. To address the above drawbacks, by using the bilinear pairings, we propose an efficient unrestricted identity-based aggregate signature. Our scheme achieves both full aggregation and constant pairing computation. We prove that our scheme has existential unforgeability under the computational Diffie-Hellman assumption.

[1]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[2]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[3]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[4]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[5]  Jung Hee Cheon,et al.  A New ID-based Signature with Batch Verification , 2004, IACR Cryptol. ePrint Arch..

[6]  Dengguo Feng,et al.  ID-Based Aggregate Signatures from Bilinear Pairings , 2005, CANS.

[7]  Javier Herranz,et al.  Deterministic Identity-Based Signatures for Partial Aggregation , 2006, Comput. J..

[8]  Craig Gentry,et al.  Identity-Based Aggregate Signatures , 2006, Public Key Cryptography.

[9]  Mihir Bellare,et al.  Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.

[10]  Chanathip Namprempre,et al.  Unrestricted Aggregate Signatures , 2007, ICALP.

[11]  Zuhua Shao,et al.  Fair exchange protocol of signatures based on aggregate signatures , 2008, Comput. Commun..

[12]  Lei Zhang,et al.  Efficient many-to-one authentication with certificateless aggregate signatures , 2010, Comput. Networks.

[13]  Stanislaw Jarecki,et al.  Identity-Based Aggregate and Multi-Signature Schemes Based on RSA , 2010, Public Key Cryptography.

[14]  Kyung-Ah Shim An ID-based aggregate signature scheme with constant pairing computations , 2010, J. Syst. Softw..

[15]  He Debiao,et al.  An ID-based proxy signature schemes without bilinear pairings , 2011 .

[16]  Baoyuan Kang On the Security of Some Aggregate Signature Schemes , 2012, J. Appl. Math..

[17]  C. P. Rangan,et al.  E � cient and Provably Secure Identity Based Aggregate Signature Schemes With Partial and Full Aggregation , 2012 .

[18]  Jayaprakash Kar Provably Secure Identity-Based Aggregate Signature Scheme , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[19]  Chun-Hua Chen,et al.  IDENTITY-BASED SEQUENTIAL AGGREGATE SIGNATURE SCHEME BASED ON RSA , 2012 .

[20]  Brent Waters,et al.  Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures , 2013, CRYPTO.

[21]  Jianhua Chen,et al.  An efficient certificateless proxy signature scheme without pairing , 2013, Math. Comput. Model..

[22]  Zhi Guan,et al.  An efficient certificateless aggregate signature with constant pairing computations , 2013, Inf. Sci..

[23]  Jia-Lun Tsai,et al.  New Identity-Based Sequential Aggregate Signature Scheme from RSA , 2013, 2013 International Symposium on Biometrics and Security Technologies.

[24]  Yi Liu,et al.  A non-delegatable strong designated verifier signature in ID-based setting for mobile environment , 2013, Math. Comput. Model..

[25]  Caifen Wang,et al.  Lossy data aggregation integrity scheme in wireless sensor networks , 2013, Comput. Electr. Eng..

[26]  Tsz Hon Yuen,et al.  Improvements on an authentication scheme for vehicular sensor networks , 2014, Expert Syst. Appl..

[27]  Debiao He,et al.  Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations , 2014, TheScientificWorldJournal.

[28]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..