PLoS ONE (Jan 2015)

Security analysis of the unrestricted identity-based aggregate signature scheme.

  • Kwangsu Lee,
  • Dong Hoon Lee

DOI
https://doi.org/10.1371/journal.pone.0128081
Journal volume & issue
Vol. 10, no. 5
p. e0128081

Abstract

Read online

Aggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a short signature. An ideal aggregate signature scheme is an identity-based aggregate signature (IBAS) scheme that supports full aggregation since it can reduce the total transmitted data by using an identity string as a public key and anyone can freely aggregate different signatures. Constructing a secure IBAS scheme that supports full aggregation in bilinear maps is an important open problem. Recently, Yuan et al. proposed such a scheme and claimed its security in the random oracle model under the computational Diffie-Hellman assumption. In this paper, we show that there is an efficient forgery on their IBAS scheme and that their security proof has a serious flaw.