Cryptanalysis and Improvement of Kang et al. Certificateless Aggregate Signature Scheme
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 6
Abstract
The most important contribution of modern cryptography is the invention of digital signatures. To deal with specific application scenarios, digital signature schemes have been evolved with different variants. One of such variant is aggregate signature scheme, which allows aggregation of different signatures by different users on different messages, to achieve computational and communication efficiency. Such schemes are useful in the design of Wireless Sensor Networks (WSN), Mobile Ad-hoc Networks (MANETS), and Vehicular Ad-hoc Networks (VANETS); where storage, bandwidth and computational complexity are major constraints. Recently, in 2017, B. Kang et al. proposed an efficient certificateless aggregate signature scheme in which they claimed that their scheme is secure against Type I and Type II adversary. However, we find some vulnerability in the signature generation algorithm. In this paper we show that this scheme is insecure against type II adversary i.e. a malicious Key Generation Centre (KGC) can forge a legal aggregate signature on any message without any access to user’s secret information. Further, we proposed an improved Certificateless Aggregate Signature (CLAS) scheme. The proposed CLAS scheme is using bilinear pairings over elliptic curves and is proven secure in Random Oracle Model under the assumption of Computational Diffie-Hellman Problem is hard. The concrete security proof assures that our scheme is secure against Type I and Type II adversary. We compared our scheme with well known existing schemes. Efficiency analysis shows that our scheme is more efficient than existing schemes in terms of communication and computational costs.
Authors and Affiliations
N. B. Gayathri, P. Vasudeva Reddy
To Propose Improvement in Probability based object tracking technique for Multiple Object Tracking
Abstract: The object tracking is the technique which is used to track object from the image or from the video. The video consists of multiple frames and in each frame location of that object had been predicted. To predic...
Comparison of Neural Network Training Functions for Hematoma Classification in Brain CT Images
Classification is one of the most important task in application areas of artificial neural networks (ANN).Training neural networks is a complex task in the supervised learning field of research. The main diffi...
Evaluation of Bitmap Index Compression using Data Pump in Oracle Database
Abstract: Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. We review the existing technologies of Compression and introduce the bitmap index...
An Indepth Understanding of eGovernance initiatives: eAuctionA Case Study Approach
Computational Method for Forensic Verification of offline Signatures
Signature verification models based on personal model have been reported by many researchers in past but the method proposed here is a forensic document examination approach using computational methods, unlike ot...