Visible to the public Comment and Improvement on Two Aggregate Signature Schemes for Smart Grid and VANET in the Learning of Network Security

TitleComment and Improvement on Two Aggregate Signature Schemes for Smart Grid and VANET in the Learning of Network Security
Publication TypeConference Paper
Year of Publication2020
AuthorsHu, Xiaoming, Tan, Wenan, Ma, Chuang
Conference Name2020 International Conference on Information Science and Education (ICISE-IE)
KeywordsAggregate Signature, Aggregates, Data collection, Education, information science, Metrics, Network security, privacy, pubcrawl, resilience, Resiliency, Scalability, security analysis, Smart grid, smart grid security, Substations, VANET, vehicular ad hoc networks
AbstractSmart substation and Vehicular Ad-Hoc Network (VANET) are two important applications of aggregate signature scheme. Due to the large number of data collection equipment in substation, it needs security authentication and integrity protection to transmit data. Similarly, in VANET, due to limited resources, it has the needs of privacy protection and improving computing efficiency. Aggregate signature scheme can satisfy the above these needs and realize one-time verification of signature for multi-terminal data collection which can improve the performance. Aggregate signature scheme is an important technology to solve network security problem. Recently, many aggregate signature schemes are proposed which can be applied in smart grid or VANET. In this paper, we present two security analyses on two aggregate signature schemes proposed recently. By analysis, it shows that the two aggregate signature schemes do not satisfy the security property of unforgeability. A malicious user can forge a signature on any message. We also present some improved methods to solve these security problems with better performance. From security analysis to improvement of aggregate signature scheme, it is very suitable to be an instance to exhibit the students on designing of security aggregate signature scheme for network security education or course.
DOI10.1109/ICISE51755.2020.00081
Citation Keyhu_comment_2020