期刊文献+

一种无证书签名方案的安全性分析及其改进 被引量:5

Security analysis and improvement of a certificateless signature scheme
下载PDF
导出
摘要 现在许多无证书签名方案过度依赖于密钥生成中心(KGC)的诚实性,所以当KGC失去诚信的时候这些方案也就失去了安全保证。通过对梁红梅等人(梁红梅,黄振杰.高效无证书签名方案的安全性分析与改进.计算机应用,2010,30(3):685-687)提出的无证书签名方案进行安全性分析,指出其方案不可抵抗消极不诚实KGC下的公钥替换攻击和积极不诚实的KGC攻击。针对该问题,采用由KGC生成用户公钥并公开的方法,对原方案进行了改进。安全性分析表明,改进后的方案可抵抗消极不诚实KGC下的公钥替换攻击,判别KGC的积极不诚实性行为和在随机预言机模型下可抵抗适应性选择消息攻击下的存在性伪造。 Nowadays,many centificateless signature schemes depend on the honesty of Key Generation Center(KGC) excessively,so they also lose security guarantees when the KGC is dishonest.By analyzing the security of the certificateless signature scheme proposed by Liang Hongmei et.al.in security analysis and improvement of efficient certificateless signature scheme publicated by Journal fo Computer Applications,2010,30(3):685-687,where the authors pointed out that the scheme could not resist public key replacement attack under negative dishonest KGC and positive dishonest KGC's attacks.Aiming at these problems,the scheme was improved by the means that KGC generated the user's public key and made it public.The analysis of security shows that the improved scheme is able to resist public key replacement attack under negative dishonest KGC,thus successfully distinguishing the positive dishonesty of KGC,and resisting existential forgery on adaptively chosen message attack under the random oracle model.
出处 《计算机应用》 CSCD 北大核心 2011年第6期1536-1538,共3页 journal of Computer Applications
关键词 双线性对 无证书签名 公钥替换攻击 计算性Diffie-Hellman问题 逆运算Diffie-Hellman问题 bilinear paring certificateless signature public key replacement attack Computational Diffie-Hellman Problem(CDHP) Inverse-Computational Diffie-Hellman Problem(Inv-CDHP)
  • 相关文献

参考文献10

  • 1AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[ C]// Cryptology-Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003: 452 - 473.
  • 2HUANG XIN-YI, SUSILO W, MU YI, et al. On the security of certificateless signature schemes from Asiaerypt 2003 [ C ]// Cryptology and Network Security: CANS 2005, LNCS 3810. Bellin: Springer Verlag, 2005: 13 - 25.
  • 3GORANTLA M C, SAXENA A. An efficient certificateless signature scheme[ C]// Proceedings of Computational Intelligence and Security: CIS 2005, LNAI 3802. Berlin: Springer-Verlag, 2005:110 - 116.
  • 4YAP W-S, HENG S-H, GOI B-M. An efficient certificateless signature scheme[ C]// Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006, LNCS 4097. Berlin: Springer-Verlag, 2006:322 - 331.
  • 5GOYA G H. Proposta de esquemas de criptografia e de assinatura sob modelo de criptografia de cha publica sere certificado[ EB/OL]. [ 2008 -09 -22]. http://www, ime. usp. br/- dhgoya/dis_denise, pdf.
  • 6CAO XUE-FEI, PATERSON K G, KOU WEI-DONG. An attack on a certificateless signature scheme: Cryptology ePrint Archibe, Report2006/367[ R/OL]. (2006 - 10 -25) [ 2008 -09 - 12]. http: eprint, iacr. org/2006/367.
  • 7PARK J H. An attack on the certificateless signature scheme from EUC workshops2006: Cryptology ePrint Archive, Report2006/442 [ R/OL]. (2006 - 11 - 24) [ 2008 - 09 - 12]. http: eprint, iacr. org/ 2006/442.
  • 8RAFAEL C, RICAPDO D. Two notes on the security of certificateless signatures[ C]// Provable Security 2007, LNCS 4784. Berlin: Springer-Verlag, 2007:85 - 102.
  • 9张玉磊,王彩芬,张永洁,程文华,韩亚宁.基于双线性对的高效无证书签名方案[J].计算机应用,2009,29(5):1330-1333. 被引量:14
  • 10梁红梅,黄振杰.高效无证书签名方案的安全性分析和改进[J].计算机应用,2010,30(3):685-687. 被引量:10

二级参考文献25

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of CRYPTO 84 on Advances in Cryptology, LNCS 196. Berlin: Springer-Verlag, 1985:47 -53.
  • 2AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography [ C]// Cryptology-Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003:452-473.
  • 3HUANG XIN-YI, SUSILO W, MU YI, et al. On the security of certifieateless signature schemes from Asiacrypt 2003 [ C]//Cryptology and Network Security: CANS 2005, LNCS 3810. Berlin: Springer- Verlag, 2005:13-25.
  • 4YUM D H, LEE P J. Generic construction of certificateless signature [ C]//Australasian Conference on Information Security and Privacy: ACISP 2004, LNCS 3108. Berlin: Springer-Verlag, 2004: 200 -211.
  • 5HUB C, WONG D S, ZHANG ZHEN-FENG, et al. Key replacement attack against a generic construction of certificateless signature [ C]// Australasian Conference on Information Security And Privacy: ACISP2006, LNCS4058. Berlin: Springer-Verlag, 2006:235 - 246.
  • 6ZHANG ZHEN-FENG, WONG D S, XU JING, et al. Certificateless public-key signature: Security model and efficient construction [ C]// Fourth International Conference on Applied Cryptography and Network Security: ACNS 2006, LNCS 3989. Berlin: Springer-Verlag, 2006:293-308.
  • 7GORANTLA M C, SAXENA A. An efficient certfficateless signature scheme [ C]//Proceedings of Computational Intelligence and Security: CIS 2005, LNAI 3802. Berlin: Springer-Verlag, 2005: 110- 116.
  • 8YAP W-S, HENG S-H, GOI B-M. An efficient certificateless signature scheme [ C]// Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006, LNCS 4097. Berlin: Springer-Verlag, 2006:322-331.
  • 9GOYA G H. Proposta de esquemas de criptografia e de assinatura sob modelo de criptografia de cha publica sem certificado [ EB/OL]. [ 2008 -09 -22 ]. http://www, ime. usp. br/- dhgoya./dis_denise. pdf.
  • 10CAO XUE-FEI, PATERSON K G, KOU WEI-DONG. An attack on a certificateless signature scheme: Cryptology ePrint Archive, Report 2006/367 [ R/OL]. (2006 - 10 -25) [2008 -09 - 12]. http://eprint, iacr. org/2006/367.

共引文献16

同被引文献57

  • 1蔡晓秋,王天银,张建中.基于Schnorr签名体制的前向安全的代理签名方案[J].河南科技大学学报(自然科学版),2005,26(4):33-36. 被引量:3
  • 2Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[C]//Proc. of the ASIACRYPT’03. Berlin, Germany: Springer-Verlag, 2003: 452-473.
  • 3Zhang Zhenfeng, Wong D S, Xu Jing, et al. Certificateless Public-key Signature: Security Model and Efficient Construction[C]//Proc. of ACNS’06. Berlin, Germany: Springer- Verlag, 2006: 293-308.
  • 4Huang Xinyi, Mu Yi, Susilo W, et al. Certificateless Signature Revisited[C]//Proc. of ACISP’07. Berlin, Germany: Springer- Verlag, 2007: 308-322.
  • 5Wang Changji, Long Dongyang, Tang Yong. An Efficient Certificateless Signature from Pairings[J]. International Journal of Network Security, 2009, 8(1): 146-150.
  • 6Girault M. Self-certified Public Keys[C]//Proc. of EuroCrypt’91. Berlin, Germany: Springer-Verlag, 1991: 490-497.
  • 7Pointcheval D, Stern J. Security Arguments for Digital Signatures and Blind Signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396.
  • 8Rafael C, Ricardo D. Two Notes on the Security of Certificateless Signatures[C]//Proc. of ProvSec’07. Berlin, Germany: Springer- Verlag, 2007: 85-102.
  • 9A1-Riyami S, Paterson K. Certificateless public key cryp- tography[ A. Advances in Cryptology proceeding of Asia- crypt 2003, LNCS : 2894 [ C ]. Berlin : Springer - Verlag, 2003 : 452-473.
  • 10Gutmann P. PKI : It's not dead, just resting [ J ]. IEEE Computer, 2002, 35(8) : 41-49.

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部