期刊文献+

高效可证明安全的无证书签名方案 被引量:8

Efficient and Provably Secure Certificateless Signature Schemes
下载PDF
导出
摘要 无证书公钥密码体制解决了基于身份的密码体制的密钥托管问题,且无需使用公钥证书。为此,借鉴无证书密码体制的思想,基于椭圆曲线离散对数问题,提出一类无双线性对的无证书签名方案,包括8种子签名方案,并在随机预言机模型下对其进行安全性证明。结果表明,提出方案可抵抗2类超级攻击以及存在性伪造攻击,具有较高的安全性。其中的最优方案在签名阶段与验证阶段仅需1次和2次标量乘法运算,计算效率相比现有无证书签名方案有明显提高。 Certificateless public key cryptography solves the key escrowproblem of identity-based cryptography. In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate. Therefor,this paper references from the thought of certificateless public key cryptography,a class of provably secure certificateless signature schemes based on Elliptic Curve Discrete Logarithm Problem( ECDLP) without pairing is proposed,which includes eight kind of signature schemes. The proposed schemes are proved provably secure in random oracle model. The analysis result shows that the proposed schemes can resist two types of super adversary and existential forgery attack,accordingly the proposed schemes have a higher security. The signing algorithm of the optimal scheme only needs one scalar multiplication,and the validation algorithm of the optimal scheme only needs two scalar multiplication. The optimal scheme is more computationally efficient than the existing schemes.
出处 《计算机工程》 CAS CSCD 北大核心 2016年第3期156-160,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61370188 61300216) 河南省重点科技攻关计划基金资助项目(122102310309) 河南省基础与前沿技术研究基金资助项目(142300410147) 河南理工大学博士基金资助项目(B2011-058)
关键词 无证书公钥密码体制 数字签名 椭圆曲线离散对数问题 存在性伪造攻击 可证明安全 certificateless public key cryptography digital signature Elliptic Curve Discrete Logarithm Problem(ECDLP) existential forgery attack provably secure
  • 相关文献

参考文献15

  • 1Shamir A. Identity-based Cryptosystems And Signature Schemes ~ C ~//Proceedings of Cryptology-Crypto ' 84. Washington D. C., USA : IEEE Press, 1984:47-53.
  • 2AI-Riyami S S,Paterson K G. Certificateless Public Key Cryptography ~ C 1//Proceedings of ASIACRYPT ' 03. B erlin, Germany : Springer, 2003 : 452-473.
  • 3张磊,张福泰.一类无证书签名方案的构造方法[J].计算机学报,2009,32(5):940-945. 被引量:44
  • 4魏春艳,蔡晓秋.标准模型下的高效无证书短签名方案[J].计算机工程,2012,38(13):119-121. 被引量:6
  • 5Harn L, Ren J, Lin C L. Design of DL-based Certificateless Digital Signatures I J ]. Journal of Systems and Software, 2009,82 ( 5 ) : 789-793.
  • 6葛爱军,陈少真.具有强安全性的不含双线性对的无证书签名方案[J].电子与信息学报,2010,32(7):1765-1768. 被引量:18
  • 7Gong Peng, Li Ping. Further Improvement of a Certificateless Signature Scheme Without Pairing [ J ]. International Journal of Communication Systems, 2012, 27(10) :2083-2091.
  • 8Yeh Kuo-hui, Tsai Kuo-yu, Kuo Ren-zong, et al. Robust Certificateless Signature Scheme Without Bilinear Pai- rings[C]//Proceedings of 2013 International Conference on IT Convergence and Security. Washington D. C.,USA: IEEE Press ,2013 : 1-4.
  • 9Zhang Jianhong, Mao J. An Efficient RSA-based Certifi- careless Signature Scheme [ J ]. Journal of Systems and Software ,2012,85 ( 3 ) :638-642.
  • 10杨波,肖自碧,李寿贵,宋春光.一种无证书签名方案的分析与改进[J].计算机工程,2012,38(9):15-18. 被引量:3

二级参考文献48

  • 1Shamir A. Identity based cryptosystems and signature schemes//Proeeedings of the Crypto'84. California, USA, 1984:47-53
  • 2Al-Riyami S, Paterson K. Certificateless public key cryptography//Proceedings of the Asiacrypt 2003. Taipei, China, 2003:452-473
  • 3Huang X, Susilo W, Mu Y, Zhang F. On the security of a certifieateless signature scheme//Proceedings of the CANS 2005. Xiamen, China, 2005:13-25
  • 4Yap W, Heng S, Goi B. An efficient certificateless signature scheme//Proceedings of the EUC Workshops 2006. Seoul, Korea, 2006:322-331
  • 5Park J. An attack on the certificateless signature scheme from EUC Workshops 2006. Cryptology ePrint Archive, Report 2006/442, 2006
  • 6Zhang Z, Feng D. Key replacement attack on a certificateless signature scheme. Cryptology ePrint Archive, Report 2006/ 453, 2006
  • 7Choi K, Park J, Hwang J, Lee D. Efficient certificateless signature schemes//Proceedings of the ACNS 2007. Zhuhai, China, 2007:443-458
  • 8Castro R, Dahab R. Two notes on the security of certificateless signatures//Proceedings of the ProvSec 2007. Wollongong, Australia, 2007:85-102
  • 9Zhang J, Mao J. Security analysis of two signature schemes and their improved sehemes//Proceedings of the ICCSA 2007. Kuala Lumpur, Malaysia, 2007:589-602
  • 10Zhang Z, Wong D, Xu J, Feng D. Certificateless public-key signature: security model and efficient construction//Proceedings of the ACNS 2006. Singapore, 20061 293-308

共引文献78

同被引文献44

引证文献8

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部