Security Analysis of the Unrestricted Identity-Based Aggregate Signature Scheme
- Authors
- Lee, Kwangsu; Lee, Dong Hoon
- Issue Date
- 18-5월-2015
- Publisher
- PUBLIC LIBRARY SCIENCE
- Citation
- PLOS ONE, v.10, no.5
- Indexed
- SCIE
SCOPUS
- Journal Title
- PLOS ONE
- Volume
- 10
- Number
- 5
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/93543
- DOI
- 10.1371/journal.pone.0128081
- ISSN
- 1932-6203
- Abstract
- Aggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a short signature. An ideal aggregate signature scheme is an identity-based aggregate signature (IBAS) scheme that supports full aggregation since it can reduce the total transmitted data by using an identity string as a public key and anyone can freely aggregate different signatures. Constructing a secure IBAS scheme that supports full aggregation in bilinear maps is an important open problem. Recently, Yuan et al. proposed such a scheme and claimed its security in the random oracle model under the computational Diffie-Hellman assumption. In this paper, we show that there is an efficient forgery on their IBAS scheme and that their security proof has a serious flaw.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.