Revisiting the security model for aggregate signature schemes

Aggregate signature schemes combine the digital signatures of multiple users on different messages into one single signature. The Boneh-Gentry-Lynn-Shacham (BGLS) aggregate signature scheme is one such scheme, based on pairings, where anyone can aggregate the signatures in any order. We suggest impr...

Full description

Bibliographic Details
Main Author: Lacharité, Marie-Sarah
Language:en
Published: 2014
Subjects:
Online Access:http://hdl.handle.net/10012/8506
id ndltd-LACETR-oai-collectionscanada.gc.ca-OWTU.10012-8506
record_format oai_dc
spelling ndltd-LACETR-oai-collectionscanada.gc.ca-OWTU.10012-85062014-06-18T03:51:39Z Revisiting the security model for aggregate signature schemes Lacharité, Marie-Sarah cryptography aggregate signatures security reduction digital signatures Aggregate signature schemes combine the digital signatures of multiple users on different messages into one single signature. The Boneh-Gentry-Lynn-Shacham (BGLS) aggregate signature scheme is one such scheme, based on pairings, where anyone can aggregate the signatures in any order. We suggest improvements to its current chosen-key security model. In particular, we argue that the scheme should be resistant to attackers that can adaptively choose their target users, and either replace other users' public keys or expose other users' private keys. We compare these new types of forgers to the original targeted-user forger, building up to the stronger replacement-and-exposure forger. Finally, we present a security reduction for a variant of the BGLS aggregate signature scheme with respect to this new notion of forgery. Recent attacks by Joux and others on the discrete logarithm problem in small-characteristic finite fields dramatically reduced the security of many type I pairings. Therefore, we explore security reductions for BGLS with type III rather than type I pairings. Although our reductions are specific to BGLS, we believe that other aggregate signature schemes could benefit from similar changes to their security models. 2014-05-26T15:19:07Z 2014-05-26T15:19:07Z 2014-05-26 2014 Thesis or Dissertation http://hdl.handle.net/10012/8506 en
collection NDLTD
language en
sources NDLTD
topic cryptography
aggregate signatures
security reduction
digital signatures
spellingShingle cryptography
aggregate signatures
security reduction
digital signatures
Lacharité, Marie-Sarah
Revisiting the security model for aggregate signature schemes
description Aggregate signature schemes combine the digital signatures of multiple users on different messages into one single signature. The Boneh-Gentry-Lynn-Shacham (BGLS) aggregate signature scheme is one such scheme, based on pairings, where anyone can aggregate the signatures in any order. We suggest improvements to its current chosen-key security model. In particular, we argue that the scheme should be resistant to attackers that can adaptively choose their target users, and either replace other users' public keys or expose other users' private keys. We compare these new types of forgers to the original targeted-user forger, building up to the stronger replacement-and-exposure forger. Finally, we present a security reduction for a variant of the BGLS aggregate signature scheme with respect to this new notion of forgery. Recent attacks by Joux and others on the discrete logarithm problem in small-characteristic finite fields dramatically reduced the security of many type I pairings. Therefore, we explore security reductions for BGLS with type III rather than type I pairings. Although our reductions are specific to BGLS, we believe that other aggregate signature schemes could benefit from similar changes to their security models.
author Lacharité, Marie-Sarah
author_facet Lacharité, Marie-Sarah
author_sort Lacharité, Marie-Sarah
title Revisiting the security model for aggregate signature schemes
title_short Revisiting the security model for aggregate signature schemes
title_full Revisiting the security model for aggregate signature schemes
title_fullStr Revisiting the security model for aggregate signature schemes
title_full_unstemmed Revisiting the security model for aggregate signature schemes
title_sort revisiting the security model for aggregate signature schemes
publishDate 2014
url http://hdl.handle.net/10012/8506
work_keys_str_mv AT lacharitemariesarah revisitingthesecuritymodelforaggregatesignatureschemes
_version_ 1716670452976320512