Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Sequential aggregate signatures with short public keys without random oracles

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Kwangsu-
dc.contributor.authorLee, Dong Hoon-
dc.contributor.authorYung, Moti-
dc.date.accessioned2021-09-04T16:11:11Z-
dc.date.available2021-09-04T16:11:11Z-
dc.date.created2021-06-18-
dc.date.issued2015-05-10-
dc.identifier.issn0304-3975-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/93569-
dc.description.abstractThe notion of aggregate signature has been motivated by applications and it enables any user to compress different signatures signed by different signers on different messages into a short signature. Sequential aggregate signature, in turn, is a special kind of aggregate signature that only allows a signer to add his signature into an aggregate signature in sequential order. This latter scheme has applications in diversified settings such as in reducing bandwidth of certificate chains and in secure routing protocols. Lu, Ostrovsky, Sahai, Shacham, and Waters (EUROCRYPT 2006) presented the first sequential aggregate signature scheme in the standard model. The size of their public key, however, is quite large (i.e., the number of group elements is proportional to the security parameter), and therefore, they suggested as an open problem the construction of such a scheme with short keys. In this paper, we propose the first sequential aggregate signature schemes with short public keys (i.e., a constant number of group elements) in prime order (asymmetric) bilinear groups that are secure under static assumptions in the standard model. Furthermore, our schemes employ a constant number of pairing operations per message signing and message verification operation. Technically, we start with a public-key signature scheme based on the recent dual system encryption technique of Lewko and Waters (TCC 2010). This technique cannot directly provide an aggregate signature scheme since, as we observed, additional elements should be published in a public key to support aggregation. Thus, our constructions are careful augmentation techniques for the dual system technique to allow it to support sequential aggregate signature schemes. We also propose a multi-signature scheme with short public parameters in the standard model. (C) 2015 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER-
dc.subjectIDENTITY-BASED AGGREGATE-
dc.subjectVERIFIABLY ENCRYPTED SIGNATURES-
dc.subjectDUAL SYSTEM ENCRYPTION-
dc.subjectMULTISIGNATURES-
dc.subjectSECURE-
dc.subjectHIBE-
dc.titleSequential aggregate signatures with short public keys without random oracles-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Kwangsu-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1016/j.tcs.2015.02.019-
dc.identifier.scopusid2-s2.0-84951845445-
dc.identifier.wosid000353856900007-
dc.identifier.bibliographicCitationTHEORETICAL COMPUTER SCIENCE, v.579, pp.100 - 125-
dc.relation.isPartOfTHEORETICAL COMPUTER SCIENCE-
dc.citation.titleTHEORETICAL COMPUTER SCIENCE-
dc.citation.volume579-
dc.citation.startPage100-
dc.citation.endPage125-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusIDENTITY-BASED AGGREGATE-
dc.subject.keywordPlusVERIFIABLY ENCRYPTED SIGNATURES-
dc.subject.keywordPlusDUAL SYSTEM ENCRYPTION-
dc.subject.keywordPlusMULTISIGNATURES-
dc.subject.keywordPlusSECURE-
dc.subject.keywordPlusHIBE-
dc.subject.keywordAuthorPublic-key signature-
dc.subject.keywordAuthorAggregate signature-
dc.subject.keywordAuthorSequential aggregate signature-
dc.subject.keywordAuthorDual system encryption-
dc.subject.keywordAuthorBilinear maps-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE