Revisiting the security model for aggregate signature schemes
Aggregate signature schemes combine the digital signatures of multiple users on different messages into one single signature. The Boneh-Gentry-Lynn-Shacham (BGLS) aggregate signature scheme is one such scheme, based on pairings, where anyone can aggregate the signatures in any order. We suggest impr...
Main Author: | |
---|---|
Language: | en |
Published: |
2014
|
Subjects: | |
Online Access: | http://hdl.handle.net/10012/8506 |
id |
ndltd-LACETR-oai-collectionscanada.gc.ca-OWTU.10012-8506 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-LACETR-oai-collectionscanada.gc.ca-OWTU.10012-85062014-06-18T03:51:39Z Revisiting the security model for aggregate signature schemes Lacharité, Marie-Sarah cryptography aggregate signatures security reduction digital signatures Aggregate signature schemes combine the digital signatures of multiple users on different messages into one single signature. The Boneh-Gentry-Lynn-Shacham (BGLS) aggregate signature scheme is one such scheme, based on pairings, where anyone can aggregate the signatures in any order. We suggest improvements to its current chosen-key security model. In particular, we argue that the scheme should be resistant to attackers that can adaptively choose their target users, and either replace other users' public keys or expose other users' private keys. We compare these new types of forgers to the original targeted-user forger, building up to the stronger replacement-and-exposure forger. Finally, we present a security reduction for a variant of the BGLS aggregate signature scheme with respect to this new notion of forgery. Recent attacks by Joux and others on the discrete logarithm problem in small-characteristic finite fields dramatically reduced the security of many type I pairings. Therefore, we explore security reductions for BGLS with type III rather than type I pairings. Although our reductions are specific to BGLS, we believe that other aggregate signature schemes could benefit from similar changes to their security models. 2014-05-26T15:19:07Z 2014-05-26T15:19:07Z 2014-05-26 2014 Thesis or Dissertation http://hdl.handle.net/10012/8506 en |
collection |
NDLTD |
language |
en |
sources |
NDLTD |
topic |
cryptography aggregate signatures security reduction digital signatures |
spellingShingle |
cryptography aggregate signatures security reduction digital signatures Lacharité, Marie-Sarah Revisiting the security model for aggregate signature schemes |
description |
Aggregate signature schemes combine the digital signatures of multiple users on different messages into one single signature. The Boneh-Gentry-Lynn-Shacham (BGLS) aggregate signature scheme is one such scheme, based on pairings, where anyone can aggregate the signatures in any order. We suggest improvements to its current chosen-key security model. In particular, we argue that the scheme should be resistant to attackers that can adaptively choose their target users, and either replace other users' public keys or expose other users' private keys. We compare these new types of forgers to the original targeted-user forger, building up to the stronger replacement-and-exposure forger. Finally, we present a security reduction for a variant of the BGLS aggregate signature scheme with respect to this new notion of forgery. Recent attacks by Joux and others on the discrete logarithm problem in small-characteristic finite fields dramatically reduced the security of many type I pairings. Therefore, we explore security reductions for BGLS with type III rather than type I pairings. Although our reductions are specific to BGLS, we believe that other aggregate signature schemes could benefit from similar changes to their security models. |
author |
Lacharité, Marie-Sarah |
author_facet |
Lacharité, Marie-Sarah |
author_sort |
Lacharité, Marie-Sarah |
title |
Revisiting the security model for aggregate signature schemes |
title_short |
Revisiting the security model for aggregate signature schemes |
title_full |
Revisiting the security model for aggregate signature schemes |
title_fullStr |
Revisiting the security model for aggregate signature schemes |
title_full_unstemmed |
Revisiting the security model for aggregate signature schemes |
title_sort |
revisiting the security model for aggregate signature schemes |
publishDate |
2014 |
url |
http://hdl.handle.net/10012/8506 |
work_keys_str_mv |
AT lacharitemariesarah revisitingthesecuritymodelforaggregatesignatureschemes |
_version_ |
1716670452976320512 |