Abstract
We survey the applications of aggregate signatures. Signatures of this type allow to aggregate different signatures produced by different users for different messages into one small signature. Given n signatures of n distinct messages, it is possible to combine them into a single signature that can be used to convince any verifier that the n users signed these n original messages. Aggregate signatures are useful for reducing the storage and bandwidth requirements and can be applied in numerous applications. In this paper, we survey these applications including PKI, blockchain, sensor networks, secure routing, fast signatures, software authentication, secure logging, and outsourced databases. For each application, we describe the types of aggregate signatures that could be used, what are the advantages and effects of using aggregate signatures there.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: EUROCRYPT 2003: Advances in Cryptology, vol. 2656, pp. 416–432. LNCS (2003)
Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: EUROCRYPT 2004: Advances in Cryptology, vol. 3027, pp. 74–90. LNCS (2004)
Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Public Key Cryptography 2006, vol. 3958, pp. 257–273. LNCS (2006)
Ahn, J., Green, M., Hohenberger, S.: Synchronized aggregate signatures: new definitions, constructions and applications. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 473–484 (2010)
Hartung, G., Kaidel, B., Koch, A., Koch, J., Rupp, A.: Fault-Tolerant aggregate signatures. In: Public-Key Cryptography—PKC 2016, vol. 9614, pp. 331–356. LNCS (2016)
Brogle, K., Goldberg, S., Reyzin, L.: Sequential aggregate signatures with lazy verification from trapdoor permutations. In: ASIACRYPT 2012: Advances in Cryptology, vol. 7658, pp. 644–662. LNCS (2012)
Vogt, H.: Exploring message authentication in sensor networks. In: Security in Ad-hoc and Sensor Networks, vol. 3313, pp. 19–30. LNCS (2005)
Ma, D., Tsudik, G.: A new approach to secure logging. ACM Trans. Storage 5(1), 1–21 (2009)
Ozmen, M., Behnia, R., Yavuz, A.: Fast authentication from aggregate signatures with improved security. In: Financial Cryptography and Data Security (2019)
Hoffstein, J., Pipher, J., Whyte, W., Zhang, Z.: A signature scheme from learning with truncation. Cryptology ePrint Archive, Report 2017/995 (2017). https://eprint.iacr.org/2017/995
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: ASIACRYPT 2001: Advances in Cryptology, vol. 2248, pp. 514–532. LNCS (2001)
Mykletun, E., Narasimha, M., Tsudik, G.: Signature bouquets: immutability for aggregated/condensed signatures. In: ESORICS 2004: Computer Security, vol. 3193, pp. 160–176. LNCS (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Makarov, A. (2020). A Survey of Aggregate Signature Applications. In: Misyurin, S., Arakelian, V., Avetisyan, A. (eds) Advanced Technologies in Robotics and Intelligent Systems. Mechanisms and Machine Science, vol 80. Springer, Cham. https://doi.org/10.1007/978-3-030-33491-8_37
Download citation
DOI: https://doi.org/10.1007/978-3-030-33491-8_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33490-1
Online ISBN: 978-3-030-33491-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)