Abstract
Aggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a short signature. An ideal aggregate signature scheme is an identity-based aggregate signature (IBAS) scheme that supports full aggregation since it can reduce the total transmitted data by using an identity string as a public key and anyone can freely aggregate different signatures. Constructing a secure IBAS scheme that supports full aggregation in bilinear maps is an important open problem. Recently, Yuan et al. proposed such a scheme and claimed its security in the random oracle model under the computational Diffie-Hellman assumption. In this paper, we show that there is an efficient forgery on their IBAS scheme and that their security proof has a serious flaw.
Citation: Lee K, Lee DH (2015) Security Analysis of the Unrestricted Identity-Based Aggregate Signature Scheme. PLoS ONE 10(5): e0128081. https://doi.org/10.1371/journal.pone.0128081
Academic Editor: Yongtang Shi, Nankai University, CHINA
Received: January 14, 2015; Accepted: April 15, 2015; Published: May 18, 2015
Copyright: © 2015 Lee, Lee. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited
Data Availability: All relevant data are within the paper.
Funding: This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MEST) (no. 2010-0029121). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing interests: The authors have declared that no competing interests exist.
1 Introduction
Aggregate signature schemes allow anyone to combine n different signatures on different n messages signed by different n signers into a short aggregate signature. The main advantage of aggregate signature schemes is the reduction of signature communication and storage requirements by the compression of multiple signatures into a single one. The applications of aggregate signature schemes include secure routing protocols, public-key infrastructure systems, and sensor networks. Boneh et al. [1] proposed the first aggregate signature scheme allowing anyone to combine different signatures in bilinear groups and proved its security in the random oracle model. Subsequently Lysyanskaya et al. [2] constructed a sequential aggregate signature scheme in which signatures can be combined sequentially, and Gentry and Ramzan [3] proposed a synchronized aggregate signature scheme in which all signers should share synchronized information. There are many additional aggregate signature schemes with different properties [4–13].
Although aggregate signature schemes can reduce the size of signatures by their aggregating them, they usually cannot reduce the total amount of transmitted data significantly since a verifier should additionally retrieve the public keys of all signers. Therefore, an important issue in aggregate signature schemes is reducing the size of public keys [7, 10–12]. An ideal solution to this problem is the use of an identity-based aggregate signature (IBAS) scheme since it uses an already known identity string as a user’s public key [3]. However, there is only one IBAS scheme with full aggregation proposed by Hohenberger et al. [9] in multilinear maps. Multilinear maps are attractive tools for cryptographic constructions, but they are currently impractical since they are based on leveled homomorphic encryption schemes [14]. There are some IBAS schemes in bilinear maps, but those schemes only support sequential or synchronized aggregation [3, 6, 8]. Therefore, constructing an IBAS scheme featuring full aggregation in bilinear maps is an important open problem.
The main challenge when devising an IBAS scheme with full aggregation is aggregating the random values of all signers such that each one hides the private key in the signature [3]. For this reason, current IBAS schemes can only aggregate the randomness of all signers through synchronized or sequential aggregation [3, 6]. Additionally, designing a secure IBAS scheme is not an easy task. In fact, even the original IBAS scheme of Boldyreva et al. [6] was broken by Hwang et al. [15] and had to be corrected later. Recently, Yuan et al. [16] proposed an IBAS scheme featuring full aggregation in bilinear maps and claimed its security in random oracle models. The authors first proposed an IBS scheme in bilinear maps and from that constructed an IBAS scheme. To demonstrate the security of their IBS scheme, the authors claimed that its security could be proven under the computational Diffie-Hellman (CDH) assumption by using Forking Lemma in the random oracle model.
In this paper, we show that the IBS and IBAS schemes of Yuan et al. [16] are not secure at all. First, we show that there is a universal forgery algorithm against their IBS scheme which outputs a forged signature by using two valid signatures. This forgery algorithm also applies to their IBAS scheme. One may wonder whether our forgery algorithm contradicts the security claims of their schemes or not. To explain this, we then show that the security proof of Yuan et al.’s IBS scheme has a serious flaw. The proof essentially relies on the condition that two forged signatures obtained using Forking Lemma have the same randomness. However, we reveal that the forged signatures of an adversary cannot satisfy this condition since the signatures of Yuan et al.’s IBS scheme are publicly re-randomized.
This paper is organized as follows: In Section 2, we review bilinear groups and the IBS and IBAS schemes of Yuan et al. In Section 3, we present a universal forgery against the IBS scheme. In Section 4, we analyze the security proof of Yuan et al.’s IBS scheme and show that it has a serious flaw.
2 The IBAS Scheme of Yuan et al
In this section, we review bilinear groups, complexity assumptions, and the IBS and IBAS schemes of Yuan et al. [16]. For more details, refer to [16].
2.1 Bilinear Groups and Complexity Assumptions
Let 𝔾 and 𝔾T be two multiplicative cyclic groups of prime order p. Let g be a generator of 𝔾. A bilinear map is a map e:𝔾 × 𝔾 → 𝔾T with the following properties:
- Bilinearity: for all u, v ∈ 𝔾 and all a, b ∈ ℤp, we have e(ua, vb) = e(u, v)ab.
- Non-degeneracy: e(g, g) ≠ 1.
Assumption 2.1 (Computational Diffie-Hellman, CDH). Let 𝔾 be a cyclic group of prime order p and g be a generator of 𝔾. The CDH assumption is that if the challenge tuple is given, no probabilistic polynomial-time (PPT) algorithm 𝓐 can compute gab ∈ 𝔾 with more than a negligible advantage. The advantage of 𝓐 is defined as where the probability is taken over random choices of a,b ∈ ℤp.
2.2 The Identity-Based Signature Scheme
The IBS scheme of Yuan et al. [16] consists of the algorithms, Setup, GenKey, Sign, and Verify, which are described as follows:
- Setup(1λ): This algorithm takes as input a security parameter 1λ. It generates bilinear groups 𝔾, 𝔾T of prime order p. Let g be a random generator of 𝔾. It chooses random exponents and two cryptographic hash functions H1:{0,1}* → 𝔾 and . It outputs a master key MK = (s1, s2) and public parameters .
- GenKey(ID, MK, PP): This algorithm takes as input an identity ID ∈ {0,1}*, the master key MK = (s1, s2), and the public parameters PP. It outputs a private key .
- Sign(M, SKID, PP): This algorithm takes as input a message M ∈ {0,1}*, a private key SKID = (D1, D2), and the public parameters PP. It selects a random exponent and computes h = H2(ID‖M). It outputs a signature .
- Verify(σ, ID, M, PP): This algorithm takes as input a signature σ = (U, V, W), an identity ID ∈ {0,1}*, a message M{0,1}*, and the public parameters PP. It computes h = H(ID‖M) and checks whether and . If both equations hold, then it outputs 1. Otherwise, it outputs 0.
Claim 2.2 ([16]) The above IBS scheme is existentially unforgeable under chosen message attacks in the random oracle model if the CDH assumption holds.
Remark 2.3 The original IBS and IBAS schemes of Yuan et al. are described in the additive notation in bilinear groups. However, in this paper, we use the multiplicative notation for notational simplicity.
Remark 2.4 The signatures of Yuan et al.’s IBS scheme are publicly re-randomized. If σ = (U, V, W) is a valid signature, then a re-randomized signature is also valid where r′ is a random exponent in .
2.3 The Identity-Based Aggregate Signature Scheme
The IBAS scheme consists of the algorithms, Setup, GenKey, Sign, Verify, Aggregate, and AggVerify. The Setup, GenKey, Sign, and Verify algorithms of Yuan et al.’s IBAS scheme are the same as their IBS scheme counterparts. The additional algorithms of the IBAS scheme of Yuan et al. [16] are described as follows:
- Aggregate(σ1, σ2, S1, S2, PP): This algorithm takes as input a signature σ1 = (U1, V1, W1) on a multiset S1 = {(ID1,1, M1,1), …, (ID1, n1, M1, n1)} of identity and message pairs, a signature σ2 = (U2, V2, W2) on a multiset S2 = {(ID2,1, M2,1), …, (ID2, n2, M2, n2)} of identity and message pairs, and the public parameters PP. It outputs an aggregate signature on the multiset S = S1∪S2.
- AggVerify(σ, S, PP): This algorithm takes as input an aggregate signature σ = (U, V, W), a multiset S = {(ID1, M1), …, (IDn, Mn)} of identity and message pairs, and the public parameters PP. It computes hi = H(IDi‖Mi) for i = 1, …, n and checks whether and . If both equations hold, then it outputs 1. Otherwise, it outputs 0.
Claim 2.5 ([16]) The above IBAS scheme is existentially unforgeable under chosen message attacks in the random oracle model if the underlying IBS scheme is unforgeable under chosen message attacks.
3 Forgery Attacks on the IBAS Scheme
In this section, we show that the IBS and IBAS schemes of Yuan et al. are not secure at all by presenting an efficient forgery algorithm. In fact, our forgery algorithm is universal since anyone who has two valid signatures on the same identity and different messages can generate a forged signature on the same identity and any message of its choice.
Lemma 3.1 There is a probabilistic polynomial-time (PPT) algorithm ℱ that can forge the IBS scheme of Yuan et al. with non-negligible probability if ℱ makes just two signature queries.
Proof. The basic idea of our forgery attack is that if a forger obtains two valid signatures on an identity, then he can derive another valid signature by computing a linear combination of those signatures with carefully chosen scalar values. A forgery algorithm ℱ is described as follows:
- ℱ randomly selects a target identity ID* and two different messages M1 and M2. It obtains a signature σ1 = (U1, V1, W1) on the pair (ID*, M1) and a signature σ2 = (U2, V2, W2) on the pair (ID*, M2) from the signing oracle.
- It randomly selects a target message M* for a forged signature. Next, it computes h1 = H2(ID*‖M1), h2 = H2(ID*‖M2), and h* = H2(ID*‖M*). It computes two exponents δ1, δ2 that satisfy the following equation
Note that δ1 and δ2 can be computed using linear algebra since the determinant h1−h2 of the left matrix is not zero if h1 ≠ h2.
- Finally, ℱ outputs a forged signature σ* on the identity and message pair (ID*, M*) as
To finish the proof, we should show that the forger ℱ outputs a (forged) signature with non-negligible probability and that the forged signature passes the verification algorithm. We know that ℱ always outputs a signature if h1 ≠ h2. Because H2 is a collision-resistant hash function and M1 ≠ M2, h1 ≠ h2 is of non-negligible probability. Now we should show that the forged signature is correct according to the verification algorithm. Let r1 and r2 be the randomness of σ1 and σ2 respectively. The correctness of the forged signature is easily verified as follows:
where the randomness of the forged signature is defined as r* = r1 δ1+r2 δ2 mod p. This completes the proof.
Corollary 3.2 There is a PPT algorithm ℱ that can forge the IBAS scheme of Yuan et al. with non-negligible probability if ℱ makes just two signature queries.
The proof of this corollary is trivial from the proof of the previous Lemma since the IBAS scheme uses the IBS scheme as its underlying signature scheme. We omit the proof.
4 Our Analysis of the Security Proof
From the forgery algorithm presented in the previous section, it is evident that the IBS and IBAS schemes of Yuan et al. are not secure. However, Yuan et al. [16] claimed that their IBS scheme is secure in the random oracle model under the CDH assumption. In this section, we analyze the security proof of Yuan et al. and show that it has a critical flaw.
4.1 The Original Proof
In this subsection, we briefly review the security proof of Yuan et al.’s IBS scheme [16] that solves the CDH problem by using Forking Lemma [17, 18].
Suppose there is an adversary 𝓐 that outputs a forged signature of the IBS scheme with a non-negligible advantage. A simulator ℬ that solves the CDH problem using 𝓐 when it is given a challenge tuple D = ((p, 𝔾, 𝔾T, e), g, ga, gb) is described as follows:
- Setup: ℬ chooses a random exponent and maintains an H1-list and an H2-list for random oracles. It implicitly sets s1 = a and publishes the public parameters .
- Hash Query: If this is an H1 hash query on an identity IDi, then ℬ handles this query as follows: If the identity IDi already appears in the H1-list, then it responds with the value in the list. Otherwise, it picks a random coin c ∈ {0,1} with Pr[c = 0] = δ for some δ and proceeds as follows: If c = 0, then it chooses and sets . If c = 1, then it chooses and sets . Next, it adds (IDi, ti, c, Qi) to the H1-list and responds to 𝓐 with H1(IDi) = Qi.
If this is an H2 hash query on an identity IDi and a message Mi, then ℬ handles this query as follows: If the tuple (IDi, Mi) already appears in the H2-list, then it responds with the value in the list. Otherwise, it randomly chooses , adds (IDi, Mi, hi) to the H2-list, and responds with H2(IDi‖Mi) = hi. - Private-Key Query: ℬ handles a private key query for an identity IDi as follows: It first retrieves (IDi, ti, c, Qi) from the H1-list. If c = 0, then it aborts the simulation since it cannot create a private key. Otherwise, it creates the private key and responds to 𝓐 with SKIDi.
- Signature Query: ℬ handles a signature query on an identity IDi and a message Mi as follows: It randomly chooses and computes h = H2(IDi‖Mi). Next, it responds to 𝓐 with a signature .
- Output: 𝓐 finally outputs a forged signature σ* = (U*, V*, W*) on an identity ID* and a message M*.
To solve the CDH problem, ℬ retrieves the tuple (ID*, t*, c*, Q*) from the H1-list. If c* ≠ 0, then it aborts since it cannot extract the CDH value. Otherwise, it obtains two valid signatures and on the same identity and message tuple (ID*, M*) such that and by applying Forking Lemma. That is, it replays ℱ with the same random tape but with a different choice of the random oracle H2. If , then we have the following equation
Thus, ℬ can compute the CDH value as if .
4.2 A Non-Extractable Forgery
To extract the CDH value from forged signatures by applying Forking Lemma, it is essential for the simulator to obtain two valid signatures and such that and . By replaying the forgery with the same random tape, but with a different choice of random oracle H2, it is possible for the simulator to obtain two valid signatures and with because of Forking Lemma. However, we show that the probability of can be negligible if the forgery is clever.
Lemma 4.1 If there is a PPT algorithm 𝓐 that can forge the IBS scheme of Yuan et al., then there is another PPT algorithm ℱ that can forge the IBS scheme with almost identical probability, but the simulator of Yuan et al. cannot extract the CDH value from the forged signatures of ℱ.
Proof. The basic idea of this proof is that anyone can re-randomize the signature of Yuan et al.’s IBS scheme by using the public parameters. In this case, even though a simulator uses the same random tape for Forking Lemma, a forgery outputs a forged signature σ* on an identity ID* and a message M* after re-randomizing it by using the information h* = H2(ID*‖M*). Let H′:{0,1}* → ℤp be a collision resistant hash function that is not modeled as the random oracle. A new forgery ℱ that uses 𝓐 as a sub-routine is described as follows:
- ℱ is first given PP and runs 𝓐 by giving PP. ℱ also handles the private key and signature queries of 𝓐 by using his own private key and signature oracles.
- 𝓐 outputs a forged signature σ′ = (U′, V′, W′) on an identity ID* and a message M*.
- ℱ computes h* = H2(ID*‖M*) and h′ = H′(U′‖h*), and then re-randomizes the forged signature of 𝓐 as
- Finally, ℱ outputs a forged signature σ* = (U*, V*, W*) on an identity ID* and M*.
To finish the proof, we should show that the forged signature of ℱ is correct and the simulator of Yuan et al. cannot extract the CDH value from the forged signatures by using Forking Lemma. Let r′ be the randomness of σ′. The correctness of the forged signature is easily checked as follows
where h* = H2(ID*‖M*) and r* = r′+h′. To extract the CDH value from the forged signature of ℱ by using Forking Lemma, the simulator of Yuan et al. should obtain two valid signatures and on the same identity and message pair (ID*, M*) such that and after replaying ℱ with the same random tape but with a different choice of the hash oracle H2. Let and be the two valid signatures obtained from ℱ by using Forking Lemma. Let and be the original signatures before the re-randomization of ℱ. If , then we have with non-negligible probability since H′ is a collision-resistance hash function and the inputs of the hash function are different. From , we have with non-negligible probability since and are re-randomized with difference values and respectively. Therefore, the event of obtaining two valid signatures only occurs with negligible probability. This completes our proof.
4.3 Discussions
From the above analysis, we know that the security of the original IBS scheme of Yuan et al. cannot be proven under the CDH assumption by applying Forking Lemma since the forger can easily re-randomize the signatures. To fix this problem, we may modify the IBS scheme to compute h = H2(U‖ID‖M) instead of computing h = H2(ID‖M) where U is the first element of a signature. In this case, the forger cannot re-randomize the signature of the modified IBS scheme since U is an input of H2. Unfortunately, this modified IBS scheme cannot be used to construct an IBAS scheme since the U from the individual signatures cannot be aggregated. Note that if each U is aggregated, then a verifier cannot check the validity of an aggregate signature since each U is not included in the aggregate signature. Therefore, there is no easy solution to the problem.
5 Conclusion
In this paper, we showed that the IBAS scheme of Yuan et al. that achieves both full aggregation and constant pairing computation is not secure at all. We presented an efficient forgery algorithm against the IBS scheme and showed that their security proof of the scheme has a serious flaw. To invalidate the security of their IBS scheme, we showed that a linear combination of two valid signatures is also a new signature. Since the security of their IBAS scheme is based on the security of their IBS scheme, their IBAS scheme is also insecure. Therefore, constructing an IBAS scheme with full aggregation in bilinear maps still remains an important open problem.
Author Contributions
Conceived and designed the experiments: KL DHL. Performed the experiments: KL. Analyzed the data: KL. Contributed reagents/materials/analysis tools: KL. Wrote the paper: KL DHL.
References
- 1.
Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham E, editor, EUROCRYPT 2003. Springer, volume 2656 of Lecture Notes in Computer Science, pp. 416–432.
- 2.
Lysyanskaya A, Micali S, Reyzin L, Shacham H (2004) Sequential aggregate signatures from trapdoor permutations. In: Cachin C, Camenisch J, editors, EUROCRYPT 2004. Springer, volume 3027 of Lecture Notes in Computer Science, pp. 74–90.
- 3.
Gentry C, Ramzan Z (2006) Identity-based aggregate signatures. In: Yung M, Dodis Y, Kiayias A, Malkin T, editors, PKC 2006. Springer, volume 3958 of Lecture Notes in Computer Science, pp. 257–273.
- 4.
Lu S, Ostrovsky R, Sahai A, Shacham H, Waters B (2006) Sequential aggregate signatures and multisignatures without random oracles. In: Vaudenay S, editor, EUROCRYPT 2006. Springer, volume 4004 of Lecture Notes in Computer Science, pp. 465–485.
- 5.
Ahn JH, Green M, Hohenberger S (2010) Synchronized aggregate signatures: new definitions, constructions and applications. In: ACM Conference on Computer and Communications Security. pp. 473–484.
- 6.
Boldyreva A, Gentry C, O’Neill A, Yum DH (2007) Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. In: Ning, P, di Vimercati, SDC, Syverson, PF, editors, ACM Conference on Computer and Communications Security. ACM, pp. 276–285. Full version available at http://eprint.iacr.org/2007/438.
- 7.
Schröder D (2011) How to aggregate the cl signature scheme. In: Atluri V, Díaz C, editors, ESORICS 2011. Springer, volume 6879 of Lecture Notes in Computer Science, pp. 298–314.
- 8.
Gerbush M, Lewko AB, O’Neill A, Waters B (2012) Dual form signatures: An approach for proving security from static assumptions. In: Wang X, Sako K, editors, ASIACRYPT 2012. Springer, volume 7658 of Lecture Notes in Computer Science, pp. 25–42.
- 9.
Hohenberger S, Sahai A, Waters B (2013) Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. In: Canetti R, Garay JA, editors, CRYPTO 2013. Springer, volume 8042 of Lecture Notes in Computer Science, pp. 494–512.
- 10.
Lee K, Lee DH, Yung M (2013) Sequential aggregate signatures with short public keys: Design, analysis and implementation studies. In: Kurosawa K, Hanaoka G, editors, PKC 2013. Springer, volume 7778 of Lecture Notes in Computer Science, pp. 423–442.
- 11.
Lee K, Lee DH, Yung M (2013) Aggregating cl-signatures revisited: Extended functionality and better efficiency. In: Sadeghi AR, editor, FC 2013. Springer, volume 7859 of Lecture Notes in Computer Science, pp. 171–188.
- 12.
Lee K, Lee DH, Yung M (2013) Sequential aggregate signatures made shorter. In: MJJ Jr, Locasto ME, Mohassel P, Safavi-Naini R, editors, ACNS 2013. Springer, volume 7954 of Lecture Notes in Computer Science, pp. 202–217.
- 13. Lu S, Ostrovsky R, Sahai A, Shacham H, Waters B (2013) Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles. J Cryptology 26: 340–373.
- 14.
Garg S, Gentry C, Halevi S (2013) Candidate multilinear maps from ideal lattices. In: Johansson T, Nguyen PQ, editors, EUROCRYPT 2013. Springer, volume 7881 of Lecture Notes in Computer Science, pp. 1–17.
- 15.
Hwang JY, Lee DH, Yung M (2009) Universal forgery of the identity-based sequential aggregate signature scheme. In: Li W, Susilo W, Tupakula UK, Safavi-Naini R, Varadharajan V, editors, ASIACCS 2009. ACM, pp. 157–160.
- 16. Yuan Y, Zhan Q, Huang H (2014) Efficient unrestricted identity-based aggregate signature scheme. PLoS ONE 9: e110100. pmid:25329777
- 17. Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptology 13: 361–396.
- 18.
Bellare M, Neven G (2006) Multi-signatures in the plain public-key model and a general forking lemma. In: Juels A, Wright RN, di Vimercati SDC, editors, ACM CCS 2006. ACM, pp. 390–399.