期刊文献+

无证书强代理签名方案的密码学分析及改进 被引量:2

Cryptanalysis and Improvement of a Certificateless Strong Proxy Signature Scheme
原文传递
导出
摘要 对一种高效无证书强代理签名方案进行了分析,指出该方案对于公钥替换攻击是不安全的.证明了敌手不仅可以通过替换原始签名者的公钥伪造代理授权,而且可以通过同时替换原始签名者和代理签名者的公钥伪造任意消息的代理签名.针对这2种公钥替换攻击提出了改进方案,使得改进后的方案克服了原方案的安全缺陷,满足了无证书强代理签名方案的安全性要求. It is analyzed that efficient certificateless strong proxy signature scheme is proven insecure against the public key replacement attack. The adversary can not only forge valid proxy delegation by substituting the public keys of the original signer, but it can also forge the proxy signatures of the proxy signer by substituting the public keys of the original signer and the proxy signer. An improved scheme is presented to resist against these attacks.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2011年第5期115-118,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60703048) 湖北省自然科学基金项目(2007ABA313)
关键词 无证书公钥密码体制 无证书强代理签名 公钥替换攻击 双线性对 certificateless public key cryptography certificateless strong proxy signature public key replacement attacks bilinear pairings
  • 相关文献

参考文献11

  • 1A1-Riyami S, Paterson K G. Certificateless public key cryptography[ C ] //Laih C S. Asiacrypt 2003. Taipei: Springer-Verlag, 2003: 452-473.
  • 2Zhang Zhenfeng, Wong Duncan S, Xu Jing, et al. Certif- icateless public-key signature: security model and effi- cient construction [ C ]//Zhou J. ACNS 2006. Singapore : Springer-Verlag, 2006 : 293-308.
  • 3Huang X, Susilo W, Mu Y, et al. On the security of cer- tificateless signature schemes from Asiacrypt 2003 [ C]// Desmedt Y G. CANS 2005. Suzhou: Springer-Verlag, 2005, 13-25.
  • 4Au M H, Chen J, Liu J K, et al. Malicious KGC attacks in certificateless cryptography [ C ]//ASIACCS 2007. Sin-gapore : ACM, 2007 : 302-311.
  • 5曹雪菲,Kenneth. G. Paterson,寇卫东.对一类无证书签名方案的攻击及改进[J].北京邮电大学学报,2008,31(2):64-67. 被引量:8
  • 6Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation [ C ] //Proceedings of CCS' 96. New Delhi: ACM, 1996: 48-57.
  • 7Lee B, Kim H, Kim K. Strong proxy signature and its applications [ C ] // Proceeding of ACISP 2001. Qiso: Springer-Verlag, 2001: 603-608.
  • 8Li Xiangxue, Chen Kefei. Certificateless signature and proxy signature schemes from bilinear pairings [ J ]. Lithu- anian Mathematical Journal, 2005, 45 ( 1 ) : 76-83.
  • 9Lu Rongbo, He Dake, Wang Changji. Cryptanalysis and improvement of a certifieateless proxy signature scheme from bilinear pairings [ C ] //Eighth ACIS International Conference on SNPD 2007. Qingdao: IEEE, 2007: 285 -290.
  • 10杜红珍,温巧燕,李文敏,金正平.高效的无证书强代理签名方案[J].北京邮电大学学报,2008,31(6):18-21. 被引量:9

二级参考文献32

  • 1禹勇,杨波,李发根,张明武.一个有效的代理环签名方案[J].北京邮电大学学报,2007,30(3):23-26. 被引量:11
  • 2Shamir A. Identity-based cryptosystems and signature schemes[C]//Blakley G R, Chaum D. Crypto 1984. New York: Springer-Verlag, 1984 : 47-53.
  • 3Al-Riyami S, Paterson K G. Certificateless public key cryptography[C]//Laih C S. Asiacrypt 2003. Taipei: Springer-Verlag, 2003: 452-473.
  • 4Du Hongzhen, Wen Qiaoyan. Efficient and provablysecure certificateless short signature scheme from bilinear pairings[ EB/OL]. [ 2007-05-20 ]. Computer Standards and Interfaces. http://doi. org/10. 1016.
  • 5Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation [ C ]//Proceedings of CCS '96. New Delhi: ACM, 1996: 48-57.
  • 6Lee B, Kim H, Kim K. Strong proxy signature and its applications [C] // Proceeding of ACISP 2001. Oiso: Springer, 2001: 603-608.
  • 7Gu Chunxiang, Zhu Huafei. An efficient ID-based proxy signature scheme from pairings [ EB/OL]. [ 2007-06- 08]. http://eprint.org/2006/158.
  • 8Li Xiangxue, Chen Kefei. Certificateless signature and proxy signature schemes from bilinear pairings [ J ]. Lithuanian Mathematical Journal, 2005, 45(1):76-83.
  • 9Lu Rongbo, He Dake, Wang Changji. Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings [ C]///Eighth ACIS International Conference on SNPD 2007. Qingdao: IEEE, 2007: 285- 290.
  • 10Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing Operation [ C ]//Proceedings of CCS'96. New Delhi: ACM, 1996 : 48-57.

共引文献16

同被引文献13

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部