Security Model for Certificateless Aggregate Signature Schemes

Gong, Long, Hong and Chen defined the security model of certificateless aggregate signature schemes for the first time. However, there are some weaknesses exist in their model. In this paper, we point out some drawbacks of the security model of Gong et al.'s and present a new one. A certificateless aggregate signature scheme that is provably secure in our model is also presented. The security of our scheme is proved based on the intractability of the computational Diffie-Hellman problem in the random oracle model.

[1]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[2]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[3]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[4]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.

[5]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[6]  Charles Lynn,et al.  Secure Border Gateway Protocol (Secure-BGP) , 2000 .

[7]  Bok-Min Goi,et al.  An Efficient Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..

[8]  Je Hong Park,et al.  An attack on the certificateless signature scheme from EUC Workshops 2006 , 2006, IACR Cryptol. ePrint Arch..

[9]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[10]  Dengguo Feng,et al.  Key Replacement Attack on a Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..

[11]  Lei Zhang,et al.  A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.

[12]  Kefei Chen,et al.  An Adaptive Stable Link Selection Algorithm for Mobile Ad Hoc Networks , 2007 .

[13]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[14]  Xiaotie Deng,et al.  Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.

[15]  Jung Hee Cheon,et al.  A New ID-based Signature with Batch Verification , 2004, IACR Cryptol. ePrint Arch..

[16]  Yi Mu,et al.  Certificateless Signature Revisited , 2007, ACISP.

[17]  Kefei Chen,et al.  Two Certificateless Aggregate Signatures From Bilinear Maps , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[19]  Yi Mu,et al.  On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.