期刊文献+

高效无证书签名方案的分析及改进 被引量:6

Analysis and Improvement of Efficient Certificateless Signature Scheme
下载PDF
导出
摘要 在基于身份的高效无证书签名方案中,签名者在生成签名时既不受公钥证书认证的约束,又无需PKG为其生成基于身份的部分公钥,从而导致任何人均可伪造其他人的签名。针对该问题,给出安全的无证书签名方案必须具备的一个条件,并对原方案做出改进。改进后的方案保持了原方案高效的优点且安全性更高。 In the efficient ID-based certificateless signature scheme, the signer can produce a valid signature without the constraint of public key authentication and the partial private key generated by trusted PKG at the same time. The attacker can forge anyone else's signature. Aiming at this problem, this paper presents an essential condition for a secure certificateless signature scheme and two corresponding efficient improved signatures are obtained. The improved signature scheme keeps the characters of high efficient and achieves higher safety level.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第11期128-130,共3页 Computer Engineering
基金 国家自然科学基金资助项目(10571113) 陕西省自然科学基金资助项目(2004A12) 陕西省教育厅科学研究计划自然科学基金资助项目(07JK375)
关键词 无证书签名方案 基于身份的密码系统 密钥托管 双线性对 certificateless signature scheme ID-based cryptosystem key escrow bilinear paring
  • 相关文献

参考文献6

  • 1Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptograpby[C]//Proc, of Cryptology-ASIANCRYPT'03. Berlin, Germay: Springer-Verlag, 2003.
  • 2Chen Xiaofeng, Zhang Fangguo, Kim K. A New ID-based Group Signature Scheme from Bilinear Pairings[C]//Proc. of WISA'03. Berlin, Germany: Springer-Verlag, 2003.
  • 3Gorantla M C, Saxena A. An Efficient Certificateless Signature Scheme[C]//Proc. of CIS'05. Berlin, Germany: Springer-Verlag, 2005.
  • 4Cao Xuefei, Paterson K, Kou Weidong. An Attack on a Certifi- cateless Signature Scheme[EB/OL]. (2006-11-03). http://eprint.iacr. org/2006/367.
  • 5Zhang Zhenfeng, Feng Dengguo. Key Replacement Attack on a Certificateless Signature Scheme[EB/OL]. (2006-12-04). http:// eprint.iacr.org/2006/453.
  • 6刘景伟,孙蓉,马文平.高效的基于ID的无证书签名方案[J].通信学报,2008,29(2):87-94. 被引量:20

二级参考文献15

  • 1BELLARE M, ROGAWAY E Random oracles are practical: a paradigm for designing efficient protocols[A]. Proc of the 1st CCCS[C]. 1993.62-73.
  • 2SHAMIR A. Identity-based cryptosystems and signature schemes[A]. Advances in Cryptology-Crypto'84[C]. Springer- Verlag. 1984. 47-53.
  • 3BONEH D, FRANKLIN M. Identity-based encryption from the wei pairing[A]. Advances in Crptology-Crypto'01[C]. Springer-Verlag. 2001. 213-229.
  • 4BONEH D, LYNN B, SHACHAM H. Short signatures from the weil Pairing[A]. Advances in Crptology-Asiacrypt'01[C]. Springer-Vedag, 2001. 514-532.
  • 5SAKAI R, OHGISHI K, KASAHARAM. Cryptosysytems based on pairing[A]. Symposium on Cryptography and Information Security- SCIS'00[C]. Okinawa, Japan, 2000. 26-28.
  • 6PATERSON K G Id-based signatures from pairings on elliptic curves[J]. Electronics Letters, 2002, 38(18):1025-1026.
  • 7HESS E Efficient identity based signature schemes based on pairings[A]. Selected Areas in Cryptography-SAC'02[C]. Springer-Verlag, 2003.310-324.
  • 8CHA J C, CHEON J H. An identity-based signature from gap diffie-hellman groups[A]. Public Key Cryptography-PKC'03[C]. Springer-Verlag, 2003.18-30.
  • 9AL-RIYAMI S S, PATERSON K G. Certicateless Public Key Cryptography[A]. ASIACRYPT 2003[C]. Springer- Verlag, 2003.452-473.
  • 10CHEN X, ZHANG E KIM K. A New ID-based Group Signature Scheme from Bilinear Pairings[A]. Proceedings of WISA'03[C]. Springer-Vedag, 2003.585-592.

共引文献19

同被引文献48

  • 1张学军.高效的使用双线性对的自认证公钥签名[J].计算机应用,2009,29(2):355-356. 被引量:6
  • 2田捷,李亮,杨鑫.Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment[J].Journal of Computer Science & Technology,2006,21(5):861-870. 被引量:6
  • 3张春生,姚绍文,张险峰.基于状态树的(t,n)门限密钥托管方案[J].计算机工程与应用,2007,43(4):146-149. 被引量:3
  • 4李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 5Zheng Y L.Digital signcryption or how to achieve cost(signature and encryption ) <<cost ( signature ) +cost (encryption) >>( 1997 ) [C]// LNCS 1294: Proceedings of Advance in CRYPTO' 97.Beilin: Springer-Verlag, 1997:165-179.
  • 6A1-Riyami S S, Paterson K G.Certificateless public key cryptography[C]//LNCS 2894: Proceedings of Asiacrypt 2003.Berlin: Springer-Verlag, 2003: 452-473,.
  • 7Bessie C, Duncan S, Zhang Z, et al.Certifieateless signature: a new security model and an improved generic construction[J]. Des Codes and Crypt,2007,42(2) : 109-126.
  • 8Zhang Z F,Wong D S,Xu J,et al.Certifieateless public-key signature:security model and efficient construction[C]//LNCS 3989: Proceedings of ACNS 2006.Berlin:Springor-Verlag,2006:293-308.
  • 9Yum D,Lee P.Generic construction of certificateless encryption[C]// LNCS 3043 : Proceedings of ICCSA' 04.Berlin: Springor-Verlag, 2004:802-811.
  • 10AI-Riyami S, Paterson K.CBE from CL-PKE: a genetic construction and efficient schemes[C]//LNCS 3386:Proceedings of PKC' 05 .Berlin: Springer-Verlag, 2005 : 398-415.

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部