Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Papers|更新时间:2024-06-05
|
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Journal on CommunicationsVol. 38, Issue 7, Pages: 123-130(2017)
作者机构:
1. 武汉大学计算机学院,湖北 武汉 430072
2. 湖北第二师范学院计算机学院,湖北 武汉 430205
3. 武汉大学国际软件学院,湖北 武汉 430072
4. 武汉大学软件工程国家重点实验室,湖北 武汉 430072
作者简介:
基金信息:
The National Natural Science Foundation of China(61501333);The National Natural Science Foundation of China(61572379);The National Natural Science Foundation of China(61472287);The Natural Science Foundation of Hubei Province(2015CFA068);The Science and Technology Program of Wuhan(2016060101010047)
Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks
because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was shown that a certificateless aggregate signature in an anonymous roaming authentication scheme was vulnerable to the signature forge attack.To address the issue
a new secure and efficient certificateless aggregate signature scheme was presented
which required no bilinear pairing operations.And then the security of the scheme under the ECDLP assumption in the random oracle model was proved.Finally the performance of proposed scheme was evaluated.Compared with the original scheme
the proposal is more secure and the total computational cost is greatly reduced .
关键词
Keywords
references
XIONG H , WU Q , CHEN Z . An efficient provably secure certificateless aggregate signature applicable to mobile computation [J ] . Control and Cybernetics , 2012 , 41 ( 2 ): 373 - 391 .
LU D , SHI R H , ZHANG S , et al . Efficient anongmons roaming autbenticotion scheme using certificateless aggregate signature in wireless network [J ] . Journal on Communications , 2016 , 37 ( 7 ): 182 - 192 .
JIANG Y , LIN C , SHEN X , et al . Mutual authentication and key exchange protocols for roaming services in wireless mobile networks [J ] . IEEE Transactions on Wireless Communications , 2006 , 5 ( 9 ): 2569 - 2577 .
ZHOU T , XU J . Provable secure authentication protocol with anonymity for roaming service in global mobility networks [J ] . Computer Networks , 2011 , 55 ( 1 ): 205 - 213 .
REN K , LOU W , KIM K , et al . A novel privacy preserving authentication and access control scheme for pervasive computing environments [J ] . IEEE Transactions on Vehicular Technology , 2006 , 55 ( 4 ): 1373 - 1384 .
KIM J , CHOI S , KIM K , et al . Anonymous authentication protocol for dynamic groups with power-limited devices [C ] // Symposium on Cryptography and Information Security (SCIS’03) . 2013 : 405 - 410 .
WAN Z , REN K , PRENEEL B . A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks [C ] // The lst ACM Conference on Wireless Network Security . ACM , 2008 : 62 - 67 .
YANG G , HUANG Q , WONG D S , et al . Universal authentication protocols for anonymous wireless communications [J ] . IEEE Transactions on Wireless Communications , 2010 , 9 ( 1 ): 168 - 174 .
Al-RIYAMI S S , PATERSON K G . Certificateless public key cryptography [C ] // International Conference on the Theory and Application of Cryptology and Information Security . Springer Berlin Heidelberg , 2003 : 452 - 473 .
YAP W S , HENG S H , GOI B M . An efficient certificateless signature scheme [C ] // International Conference on Embedded and Ubiquitous Computing . Springer Berlin Heidelberg , 2006 : 322 - 331 .
LI J , HUANG X , MU Y , et al . Cryptanalysis and improvement of an efficient certificateless signature scheme [J ] . Journal of Communications and Networks , 2008 , 10 ( 1 ): 10 - 17 .
AU M H , MU Y , ChEN J , et al . Malicious KGC attacks in certificateless cryptography [C ] // The 2nd ACM Symposium on Information,Computer and Communications Security . ACM , 2007 : 302 - 311 .
GONG Z , LONG Y , HONG X , et al . Two certificateless aggregate signatures from bilinear maps [C ] // Software Engineering,Artificial Intelligence,Networking,and Parallel/Distributed Computing,2007.SNPD 2007 . Eighth ACIS International Conference on IEEE , 2007 ,3: 188 - 193 .
ZHANG L , ZHANG F . A new certificateless aggregate signature scheme [J ] . Computer Communications , 2009 , 32 ( 6 ): 1079 - 1085 .
HORNG S J , TZENG S F , HUANG P H , et al . An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks [J ] . Information Sciences , 2015 , 317 : 48 - 66 .
LI J , YUAN H , ZHANG Y . Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks [J ] . Networks , 2015 , 317 : 48 - 66 .
POINTCHEVAL D , STERN J . Security arguments for digital signatures and blind signatures [J ] . Journal of Cryptology , 2000 , 13 ( 3 ): 361 - 396 .