Download presentation
Presentation is loading. Please wait.
1
Reporter :Chien-Wen Huang
Hybrid Aggregate Signature Scheme: A New Type Aggregate Signature Scheme Date: Reporter :Chien-Wen Huang 出處: 2009 Second International Conference on Information and Computing Science
2
Outline INTRODUCTION 1 2 3 DISCUSSIONS 4 CONCLUSIONS 3 5
REVIEW OF MONO-AGGREGATION SIGNATURES 2 PROPOSED HYBRID AGGREGATE SIGNATURE SCHEME 3 DISCUSSIONS 4 CONCLUSIONS 3 5
3
INTRODUCTION(1) An aggregate signature scheme--a digital signature scheme with the additional property A corresponding aggregate verification process that takes input , and accept or reject. stand for a vector
4
Many various types of aggregate signature schemes have been proposed
INTRODUCTION(2) Many various types of aggregate signature schemes have been proposed Sequential aggregate signature schemes. Identity-based aggregate signature schemes. Identity-based sequential aggregate signature schemes. Aggregate proxy signature schemes.
5
REVIEW OF MONO-AGGREGATION SIGNATURES
A. Boneh’s Aggregate Signature Scheme Let be groups, all of the same prime order p. Let be a non-degenerate. Let g be a generator of and the system parameters are params=
6
REVIEW OF MONO-AGGREGATION SIGNATURES
Key generation algorithm K:pick ,and compute ,the public key is Ordinary signature generation algorithm S:given and a message , Ordinary signature verification V: Signature aggregate algorithm Ag: Aggregate signature verification algorithm AV:
7
REVIEW OF MONO-AGGREGATION SIGNATURES
B. Li’s Aggregate Proxy Signature Scheme two collision-resistant and the system parameters are params=
8
REVIEW OF MONO-AGGREGATION SIGNATURES
Key generation: the key pair Delegation of proxy signing rights: Generation of proxy signature: Proxy signing algorithm: Verification of proxy signature: Aggregate of proxy signature: Verification of proxy aggregate signature:
9
PROPOSED HYBRID AGGREGATE SIGNATURE SCHEME
To avoid trivial attacks: To avoid delegation warrant substitution attacks:proxy signers must include explicitly the corresponding warrants. hash function the system parameters are params=
10
PROPOSED HYBRID AGGREGATE SIGNATURE SCHEME
Key generation algorithm K: Ordinary signing algorithm S : Ordinary signature verification algorithm V : Proxy delegation protocol (D,P) :proxy signer 、 user and warrant to compute ,if check Proxy signing algorithm PS :
11
PROPOSED HYBRID AGGREGATE SIGNATURE SCHEME
Proxy signature verification algorithm PV : Hybrid aggregate algorithm HA: Hybrid aggregate signature verification algorithm HV:
12
DISCUSSIONS an aggregate signature of r+2s ordinary signatures on messages The scheme is provable secure against existential forgeability in the aggregate chosen key model.
13
reduce bandwidth and storage especially attractive for mobile devices
CONCLUSIONS reduce bandwidth and storage especially attractive for mobile devices where communication is more power-expensive than computation and reducing battery life.
14
Thank You !
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.