期刊文献+

对标准模型下无证书签名方案的安全性分析 被引量:1

Security analysis of certificateless signature scheme in standard model
下载PDF
导出
摘要 通过对一个标准模型下可证安全的无证书签名方案进行分析,指出该方案是不安全的。分析了一种针对该方案的公钥替换攻击和改进方案,说明该公钥替换攻击是一种平凡的伪造攻击,指出了这个改进方案也是不安全的。提出了一种新的密钥生成中心KGC攻击,即通用恶意KGC攻击,在这种攻击下,这两个无证书签名方案的KGC总是能够在系统参数生成阶段生成包含陷门信息的系统参数,利用这些参数,KGC不需要计算出用户的私钥就可以冒充任意系统用户对任意消息进行伪造签名。给出了攻击方法,并针对这种通用恶意KGC攻击提出了新的改进方案,使其能够抵抗这种攻击。 A certificateless signature scheme provably secure in the standard model is analyzed.It points out that the scheme is insecure.A kind of public key replacement attack against this scheme and an improved scheme is also analyzed and it shows that the attack is trivial and the improved scheme is vulnerable.A new malicious KGC attack called universal malicious KGC attack is given.In this attack, malicious KGC can generate the trapdoor system parameters of the schemes in set-up phase and forge signatures of any user for any message in the signing phase.A new improved scheme is presented to resist against this attack.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第11期11-14,共4页 Computer Engineering and Applications
基金 国家自然科学基金No.60703048 湖北省自然科学基金(No.2007ABA313)~~
关键词 无证书签名 恶意KGC攻击 公钥替换攻击 双线性对 certificateless signature malicious Key. Generator Center (KGC) attack public key replacement attack bilinear pairing
  • 相关文献

参考文献12

  • 1Al-Riyami S S, Paterson K.Certificateless public key cryptography[C]//LNCS 2894: ASIACRYPT 2003.Berlin: Springer-Verlag, 2003:452-473.
  • 2Huang X, Susilo W,Mu Y,et al.On the security of certificate- less signature schemes from Asiacrypt 2003[C]//Proceedings of CANS 2005.Berlin:Springer-Verlag,2005: 13-25.
  • 3Zhang Z,Wong D S, Xu J, et al.Certificateless public-key signa-ture: Security model and efficient construction[C]//Proeeedings of ACNS 2006.Berlin: Springer-Verlag, 2006: 293-308.
  • 4Hu B C, Wong D S,Zhang Z, et al.Certificateless signature:A new security model and an improved generic construction[J].De- signs,Codes and Cryptography,2007,42(2) : 109-126.
  • 5Au M H, Chen J, Liu J K, et al.Malicious KGC attacks in cer- tificateless cryptography[C]//Proceedings of ASIACCS 2007.New York: ACM, 2007: 302-311.
  • 6Liu J K,Au M H, Susilo W.Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard mode[C]//ACM ASIACCS' 07.New York: ACM Press, 2007: 273-283.
  • 7Huang Q, Wong D S.Generic certificateless encryption in the stan- dard model[C]//LNCS 4752:IWSEC 2007.Berlin:Springer-Verlag, 2007 : 278-292.
  • 8Xiong Hu, Qin Zhiguang, Li Fagen.An improved certificateless signature scheme secure in the standard model[J].Fundamenta Imformaticae, 2008,88 ( 1 ) : 193-206.
  • 9王化群,徐名海,郭显久.几种无证书数字签名方案的安全性分析及改进[J].通信学报,2008,29(5):88-92. 被引量:17
  • 10胡国政 韩兰胜 王展青.标准模型下一种无证书签名方案的密码学分析和改进.北京工业大学学报,2010,36(2):54-58.

二级参考文献27

  • 1Al-Riyami S S,Paterson K.Certificateless public key cryptography [C]//LNCS 2894:ASIACRYPT 2003.Berlin:Springer-Verlag,2003: 452-273.
  • 2Hu B.Key replacement attack against a generic construction of certificateless signature[C]//LNCS 4058:ACISP'06.Berlin:Springer- Verlag, 2006 : 235-246.
  • 3Huang X.On the security of certificateless signature schemes from Aisacrypt 2003 [C]//LNCS 2810 : CANS 2005.Berlin : Springer-Verlag, 2005.
  • 4Liu J K.Self generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model[EB/OL]. (2006-10-28)[2006-12-04].http ://eprint.iacr.org/2006/373.
  • 5Paterson K,Schuldt J.Efficient identity-based signatures secure in the standard mode[EB/OL]. ( 2006-02-28 ) [2006-04-20].http :// eprint.iacr.org/2006/080.
  • 6Yum D H,Lee P J.Generic construction of certificateless signature[C]// LNCS 3108 : ACISP' 04.Berlin : Springer-Verlag, 2004.
  • 7A1-Riyami S, Paterson K. Certificateless Public Key Cryptography[C]//Proc, of ASIACRYPT'03, Berlin, Germany: Springer- Verlag, 2003: 452-473.
  • 8Huang Xinyi, Susilo W, Mu Yi, et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003[C]//Proc. of CANS'05. Berlin, Germany: Springer-Verlag, 2005: 13-25.
  • 9Cao X E Kenneth G E Kou W D. An Attack on a Certificateless Signature Scheme[EB/OL]. (2006-03-21). http://eprint.iacr.org/ 2006/367.
  • 10Hu B, Wong D, Zhang Zhengfeng, et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature[C]//Proc. of ACISP'06. Berlin, Germany: Springer-Verlag, 2006: 235-246.

共引文献19

同被引文献7

  • 1M.Blaze, G.Bleumer. M.Strauss. Divertible protocols and atomic proxy cryptography. In advances in Cryptology EUROCRYPT'98, Volume 1403 of LNCpp. 127-144,1998.
  • 2A.Shamir. Identity based cryptosystems and signature schemes. Advances in Cryptology-Crypto'84, Lecture Notes in Computer Science .Vol. 196. pages 47-53 ,Springer-Verlag, 1984.
  • 3S. S. A1-riyami, K. G. Paterson. Certificateless public key cryptography. In Advances in Cryptography-Asiacryt 2003, volume 2894 of LNCS.pp.452-273, Springer-Verlag, 2003.
  • 4CANETTIR, GOLDREICH O, HALEVI S. The random oracle methodology[J].Joumal of the AC M,2004,51 (4):577-594.
  • 5M. Au, J.Chen, J. Liu, Y. Mu, D Wong and G Yang. Malicious KGC Attacks in Certificateless Cryptography. In ACM, ASIACCS '07,pp. 302-311,2007.
  • 6G.Ateniese, S.Hohenberger. Proxy Re-signatures:New Definitions Algorithms, and Applications. In ACM CCS 2005,pp.310- 319,2005.
  • 7J. Shao, Z. F. Cao, L. C. Wang, X. H. Liang. Proxy re-signature schemes without random Oracles In indocrypt 2007,volumne 4859 of LNCS,pp.197-209. Springer-Verlag, 2007.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部