期刊文献+

两个无证书代理签名方案的密码学分析

Cryptanalysis of two certificateless proxy signature schemes
下载PDF
导出
摘要 针对最近提出的两个无证书代理签名方案及其改进方案,从密码学的角度对其安全性进行了研究,指出其存在相同的安全性缺陷,即攻击者能够实施公钥替换攻击,从而能伪造出有效签名,并分析了存在公钥替换攻击的正确性及原因。同时,也指出了另外一个缺陷即攻击者可以假冒原始签名人将任何消息的代理签名权委托给任何代理人。实验结果表明,该方案的设计并不满足数字签名方案所需的安全性要求。最后,给出了克服各种攻击的改进措施。 The security of two certificateless proxy signature scheme and their improved scheme from the cryptograph point of view is studied. It is pointed out that they have the same defect in security which is the attacker can forge an effective signer to actualize an attack of public key replace. There is also the analysis of correctness and reasons of the public key replace attack given. At the same time, another defect which is the attacker can personate the origin signer to give the proxy signature of any message to any other proxy. The result shows that these schemes are not satisfy the security requires needed in digital signature scheme. In the last, the improved measures is given to overcome the various attack.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第10期2398-2400,共3页 Computer Engineering and Design
基金 国家自然科学基金项目(60673191) 广东省高等学校自然科学研究重点基金项目(06Z012) 广东外语外贸大学科研创新团队基金项目(GW2006-TA-005)
关键词 密码学 数字签名 代理签名 无证书 公钥替换攻击 cryptography digital signature proxy signature certificateless public key replacement attack
  • 相关文献

参考文献10

  • 1Al-Riyami S S, Paterson K G. Oertificateless public key cryptography [C]. Proceedings of Asiacrypt 2003. Berlin: Springer- Verlag,2003:452-473.
  • 2Yum D H,Lee P J.Generic construction of certificateless signature:Inforrnation security and privacy[C].9th Australasian Conference,ACISP 2004.Berlin:Springer- Verlag,2004:200-211.
  • 3M.Choudary Gorantla,Ashutosh Saxena.An efficient certificateless signature scheme:Computational Intelligence and Security 2005.Berlin:Springer-Verlag,2005:110-116.
  • 4Yap W S,Sherman S M C,Heng W H,et al.Security mediated certificateless signatures [C]. ACNS 2007. Berlin: Springer-Verlag, 2007:459-477.
  • 5肖自碧,杨波,温巧燕.发展安全的公钥密码系统的新方法研究[J].计算机应用研究,2007,24(10):5-8. 被引量:5
  • 6Li X,Chen K, Sun L.Certificateless signature and proxy signature schemes from bilinear pairings [J]. Lithuanian Mathematical Journal,2005,45(1):76-83.
  • 7Lu Rongbo, He Dake,Wang Changji.Cryptanalysis and improvement ofa certificateless proxy signature scheme from bilinear pairings [C]. SNPD 2007,8th ACIS International Conference, IEEE International Conference,2007:285-290.
  • 8Yap W S,Heng S H,Goi B M.Cryptanalysis of some proxy signature schemes without certificate[C].WISTP 2007.Berlin:Springer-Verlag,2007:115-126.
  • 9樊睿,王彩芬,蓝才会,左为平.新的无证书的代理签名方案[J].计算机应用,2008,28(4):915-917. 被引量:15
  • 10Boneh D,Lynn B,Shacham H.Short signature from the Weil pairing[C].Advances in Cryptology, Asiacrypt 2001 .Berlin: Springer-Verlag,2001:514-532.

二级参考文献22

  • 1GIRAULT M.Self-certified public keys[C]//Advances in Cryptology-Eurocrypt'91,LNCS 547.Berlin:Springer-Verlag,1991:490-497.
  • 2BONEH D,FRANKLIN M.Identity-based encryption from the Weil pairing[C]//Advances in Cryptology-Crypto'01,LNCS 2139.Berlin:Springer-Verlag,2001:213-229.
  • 3PATERSON K G,PRICE G.A comparison between traditional public key infrastructures and identity-based cryptography[J].Information Security Technical Report,2003,8(3):57-72.
  • 4SHAMIR A.Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology-Crypto'84,LNCS 196.Berlin:Springer-Verlag,1984:47-53.
  • 5CHA J C,CHEON J H.An identity-based signature from gap DiffieHellman groups[C]//Proc of Public Key Cryptography-PKC'03,LNCS 2567.Berlin:Springer-Verlag,2003:18-30.
  • 6HESS F.Efficient identity-based signature schemes based on pairings[C]//Proc of Selected Areas in Cryptography-SAC'02,LNCS 2595.Berlin:Springer-Verlag,2003:310-324.
  • 7SMART N P.An identity-based authenticated key agreement protocol based on the Weil pairing[J].Electronics Letters,2002,38(13):630-632.
  • 8GENTRY C,SILVERBERG A.Hierarchical ID-based cryptography[C]//Advances in Cryptology-Asiacrypt'02,LNCS 2501.Berlin:Springer-Verlag,2002:548-566.
  • 9PATERSON K G.Cryptography from pairings:a snapshot of current research[J].Information Security Technical Report,2002,7(3):41-54.
  • 10GENTRY C.Certificate-based encryption and the certificate revocation problem[C]//Advances in Cryptology-Eurocrypt'03,LNCS 2656.Berlin:Springer-Verlag,2003:272-293.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部