期刊文献+

三个无证书签名方案的密码学分析与改进 被引量:3

Cryptanalysis and Improvement of Three Certificateless Signature Schemes
下载PDF
导出
摘要 分析3个无证书签名方案,指出第1种方案不能抵抗消极不诚实密钥生成中心的攻击,后2种方案不能抵抗公钥替换攻击。通过在部分私钥生成阶段绑定公钥,提高第1种方案的安全性。在签名阶段,利用公钥绑定散列函数将用户公钥与消息绑定,由此弥补后2种方案的安全缺陷。 This paper analyzes three certificateless signature schemes and points out that the first one can not resist the negative dishonest Key Generation Center(KGC)'s attack,and the others are insecure under public key replacement attack.The first one is improved by means of binding public key when partial private key is generated,and the others are improved by means of binding public key to hash function.
作者 周才学
出处 《计算机工程》 CAS CSCD 2012年第19期114-118,共5页 Computer Engineering
关键词 无证书签名 盲签名 分叉引理 公钥替换攻击 密钥生成中心 消极不诚实KGC攻击 积极不诚实KGC攻击 certificateless signature blind signature forking lemma public key replacement attack Key Generation Center(KGC) negative dishonest KGC's attack positive dishonest KGC's attack
  • 相关文献

参考文献11

  • 1Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[C]//Proc. of the ASIACRYPT’03. Berlin, Germany: Springer-Verlag, 2003: 452-473.
  • 2Zhang Zhenfeng, Wong D S, Xu Jing, et al. Certificateless Public-key Signature: Security Model and Efficient Construction[C]//Proc. of ACNS’06. Berlin, Germany: Springer- Verlag, 2006: 293-308.
  • 3Huang Xinyi, Mu Yi, Susilo W, et al. Certificateless Signature Revisited[C]//Proc. of ACISP’07. Berlin, Germany: Springer- Verlag, 2007: 308-322.
  • 4张玉磊,王彩芬,张永洁,程文华,韩亚宁.基于双线性对的高效无证书签名方案[J].计算机应用,2009,29(5):1330-1333. 被引量:14
  • 5梁红梅,黄振杰.高效无证书签名方案的安全性分析和改进[J].计算机应用,2010,30(3):685-687. 被引量:10
  • 6黄明军,杜伟章.一种无证书签名方案的安全性分析及其改进[J].计算机应用,2011,31(6):1536-1538. 被引量:5
  • 7Wang Changji, Long Dongyang, Tang Yong. An Efficient Certificateless Signature from Pairings[J]. International Journal of Network Security, 2009, 8(1): 146-150.
  • 8魏萍,陈海滨,杨晓元.一个安全无证书的盲签名方案[J].计算机工程与应用,2011,47(5):96-97. 被引量:5
  • 9Girault M. Self-certified Public Keys[C]//Proc. of EuroCrypt’91. Berlin, Germany: Springer-Verlag, 1991: 490-497.
  • 10Pointcheval D, Stern J. Security Arguments for Digital Signatures and Blind Signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396.

二级参考文献41

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of CRYPTO 84 on Advances in Cryptology, LNCS 196. Berlin: Springer-Verlag, 1985:47 -53.
  • 2AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography [ C]// Cryptology-Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003:452-473.
  • 3HUANG XIN-YI, SUSILO W, MU YI, et al. On the security of certifieateless signature schemes from Asiacrypt 2003 [ C]//Cryptology and Network Security: CANS 2005, LNCS 3810. Berlin: Springer- Verlag, 2005:13-25.
  • 4YUM D H, LEE P J. Generic construction of certificateless signature [ C]//Australasian Conference on Information Security and Privacy: ACISP 2004, LNCS 3108. Berlin: Springer-Verlag, 2004: 200 -211.
  • 5HUB C, WONG D S, ZHANG ZHEN-FENG, et al. Key replacement attack against a generic construction of certificateless signature [ C]// Australasian Conference on Information Security And Privacy: ACISP2006, LNCS4058. Berlin: Springer-Verlag, 2006:235 - 246.
  • 6ZHANG ZHEN-FENG, WONG D S, XU JING, et al. Certificateless public-key signature: Security model and efficient construction [ C]// Fourth International Conference on Applied Cryptography and Network Security: ACNS 2006, LNCS 3989. Berlin: Springer-Verlag, 2006:293-308.
  • 7GORANTLA M C, SAXENA A. An efficient certfficateless signature scheme [ C]//Proceedings of Computational Intelligence and Security: CIS 2005, LNAI 3802. Berlin: Springer-Verlag, 2005: 110- 116.
  • 8YAP W-S, HENG S-H, GOI B-M. An efficient certificateless signature scheme [ C]// Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006, LNCS 4097. Berlin: Springer-Verlag, 2006:322-331.
  • 9GOYA G H. Proposta de esquemas de criptografia e de assinatura sob modelo de criptografia de cha publica sem certificado [ EB/OL]. [ 2008 -09 -22 ]. http://www, ime. usp. br/- dhgoya./dis_denise. pdf.
  • 10CAO XUE-FEI, PATERSON K G, KOU WEI-DONG. An attack on a certificateless signature scheme: Cryptology ePrint Archive, Report 2006/367 [ R/OL]. (2006 - 10 -25) [2008 -09 - 12]. http://eprint, iacr. org/2006/367.

共引文献20

同被引文献14

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部