期刊文献+

一种无证书签名方案的安全性分析及改进 被引量:1

Cryptanalysis and Improvement of a Certificateless Digital Signature Scheme
下载PDF
导出
摘要 利用无证书密码体制的安全模型,分析一种无证书数字签名方案,发现存在安全性缺陷.针对这些安全性缺陷,对原方案进行改进.其安全性基于一个经典的困难问题——计算Diffie-Hellman问题,使得改进方案是可证安全的. With the help of a certificateless security model,a certificateless digital signature was analyzed and the security flaws were found.The original scheme was improved for these security flaws.Its security is based on a classical difficult problem——computing Diffie-Hellman problem.The improved scheme is provably secure.
出处 《平顶山学院学报》 2012年第2期59-64,共6页 Journal of Pingdingshan University
基金 河南省科技计划重点项目(102102210416)
关键词 无证书签名 双线性对 公钥替换攻击 随机预言模型 certificateless digital signature public key substitution attack bilinear pairings random oracle model
  • 相关文献

参考文献10

二级参考文献55

  • 1Shamir A. Identity based cryptosystems and signature schemes//Proeeedings of the Crypto'84. California, USA, 1984:47-53
  • 2Al-Riyami S, Paterson K. Certificateless public key cryptography//Proceedings of the Asiacrypt 2003. Taipei, China, 2003:452-473
  • 3Huang X, Susilo W, Mu Y, Zhang F. On the security of a certifieateless signature scheme//Proceedings of the CANS 2005. Xiamen, China, 2005:13-25
  • 4Yap W, Heng S, Goi B. An efficient certificateless signature scheme//Proceedings of the EUC Workshops 2006. Seoul, Korea, 2006:322-331
  • 5Park J. An attack on the certificateless signature scheme from EUC Workshops 2006. Cryptology ePrint Archive, Report 2006/442, 2006
  • 6Zhang Z, Feng D. Key replacement attack on a certificateless signature scheme. Cryptology ePrint Archive, Report 2006/ 453, 2006
  • 7Choi K, Park J, Hwang J, Lee D. Efficient certificateless signature schemes//Proceedings of the ACNS 2007. Zhuhai, China, 2007:443-458
  • 8Castro R, Dahab R. Two notes on the security of certificateless signatures//Proceedings of the ProvSec 2007. Wollongong, Australia, 2007:85-102
  • 9Zhang J, Mao J. Security analysis of two signature schemes and their improved sehemes//Proceedings of the ICCSA 2007. Kuala Lumpur, Malaysia, 2007:589-602
  • 10Zhang Z, Wong D, Xu J, Feng D. Certificateless public-key signature: security model and efficient construction//Proceedings of the ACNS 2006. Singapore, 20061 293-308

共引文献74

同被引文献16

  • 1蔡晓秋,王天银,张建中.基于Schnorr签名体制的前向安全的代理签名方案[J].河南科技大学学报(自然科学版),2005,26(4):33-36. 被引量:3
  • 2Adams C,Lloyd S.Understanding Public-Key Infrastructure-Concepts,Standards,and Deployment Considerations [ M ].Indiana,USA:Sams,1999.
  • 3Shamir A.Identity-Based Cryptosystem and Signature Scheme [ C ]//Advances in Cryptology-Crypto' 84,LNCS 196.Berlin Springer-Verlag,1984:47-53.
  • 4Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography [ C ]//Advances in Cryptology-ASIACRYPT' 03 Berlin:Springer-Verlag,2003:452-473.
  • 5Huang X Y,Susilo W,Mu Y,et al.On the Security of Certificateless Signature Schemes from Asia Crypt' 03 [ C ]//Proceedings of CANS' 05.Berlin:Springer-Verlag,2005:13-25.
  • 6Huang X Y,Mu Y,Susilo W,et al.Certificateless Signature Revisited [ C ]//Information Security and Privacy,ACISP 2007,LNCS 4586.Berlin:Springer-Verlag,2007:308-322.
  • 7Hu B C,Wong D S,Zhang Z,etal.Key Replacement Attack Against a Generic Construction of Certificateless Signature [ C ]//Proceedings of ACISP' 06.Berlin:Springer-Verlag,2006:235-246.
  • 8Pointcheval D,Stern J.Security Proofs for Signature Schemes [ C ]//Proceedings of the EUROCRYPT ' 96.Spain Saragossa,1996:387-398.
  • 9刘景伟,孙蓉,马文平.高效的基于ID的无证书签名方案[J].通信学报,2008,29(2):87-94. 被引量:20
  • 10张磊,张福泰.一类无证书签名方案的构造方法[J].计算机学报,2009,32(5):940-945. 被引量:44

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部