期刊文献+

两种无证书签名方案的密码学分析及改进

Cryptanalysis and improvement of two certificateless signature schemes
下载PDF
导出
摘要 对苏万力等提出的无证书签名方案和张玉磊等提出的无证书签名方案进行了安全性分析,指出这两个方案在公钥替换攻击下是不安全的,分别给出了这两个方案的一种伪造攻击。提出了这两个方案的改进方案,改进方案克服了原方案的缺陷,提高了系统的安全性,并保留了原方案的优点。 Security analyses of two certificateless signature schemes presented respectively by Su Wanli et al.and Zhang Yulei et al.are given.It is found that the two schemes are insecure against public-key replacement attacks and a forgery attack on the two schemes is given respectively.Two improved schemes for the two schemes are proposed.The improved schemes overcome the security flaws of original schemes,improve the security of the system,and retain some merits of the original schemes.
作者 杜红珍
出处 《计算机工程与应用》 CSCD 北大核心 2011年第16期69-70,82,共3页 Computer Engineering and Applications
基金 陕西省自然科学基础研究计划项目(No.2010JM2016) 宝鸡文理学院博士科研项目(No.ZK0952)
关键词 无证书签名 公钥替换攻击 双线性对 certificateless signature public-key replacement attack bilinear pairing
  • 相关文献

参考文献3

二级参考文献25

  • 1Shamir A. Identity-based cryptosystems and signature schemes[C]//Blakley G R, Chaum D. Crypto 1984. New York: Springer-Verlag, 1984 : 47-53.
  • 2Al-Riyami S, Paterson K G. Certificateless public key cryptography[C]//Laih C S. Asiacrypt 2003. Taipei: Springer-Verlag, 2003: 452-473.
  • 3Du Hongzhen, Wen Qiaoyan. Efficient and provablysecure certificateless short signature scheme from bilinear pairings[ EB/OL]. [ 2007-05-20 ]. Computer Standards and Interfaces. http://doi. org/10. 1016.
  • 4Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation [ C ]//Proceedings of CCS '96. New Delhi: ACM, 1996: 48-57.
  • 5Lee B, Kim H, Kim K. Strong proxy signature and its applications [C] // Proceeding of ACISP 2001. Oiso: Springer, 2001: 603-608.
  • 6Gu Chunxiang, Zhu Huafei. An efficient ID-based proxy signature scheme from pairings [ EB/OL]. [ 2007-06- 08]. http://eprint.org/2006/158.
  • 7Li Xiangxue, Chen Kefei. Certificateless signature and proxy signature schemes from bilinear pairings [ J ]. Lithuanian Mathematical Journal, 2005, 45(1):76-83.
  • 8Lu Rongbo, He Dake, Wang Changji. Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings [ C]///Eighth ACIS International Conference on SNPD 2007. Qingdao: IEEE, 2007: 285- 290.
  • 9SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of CRYPTO 84 on Advances in Cryptology, LNCS 196. Berlin: Springer-Verlag, 1985:47 -53.
  • 10AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography [ C]// Cryptology-Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003:452-473.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部