期刊文献+

一个改进的无证书签名方案

An Improved Certificateless Signature Scheme
下载PDF
导出
摘要 该文分析了无证书签名方案,指出该方案不能抵抗公钥替换攻击。采用绑定公钥到Hash函数的方法对洪方案进行改进,改进的方案可以抵抗替换公钥攻击,并且具有较高的效率,其安全性依赖于q强Diffie-Hellman(q-SDH)困难问题和逆计算Diffie-Hellman(Inv-CDH)困难问题。 By analyzing the security of the certificateless signature(CLS) scheme proposed by Hong et al,the authors pointed out that their scheme was insecure against public key replacement attack.An improved scheme was proposed using binding the public key to the hash function,which was secure against public key replacement attack and was very efficient.Its security relies on the hardness of q-strong Diffie-Hellman(q-SDH) problem and inverse-computational Diffie-Hellman(Inv-CDH) problem.
出处 《杭州电子科技大学学报(自然科学版)》 2012年第5期67-69,共3页 Journal of Hangzhou Dianzi University:Natural Sciences
基金 浙江省自然科学基金资助项目(Y1100818)
关键词 无证书签名 公钥替换攻击 逆计算问题 certificateeless signature scheme public key substation attack
  • 相关文献

参考文献9

二级参考文献62

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of CRYPTO 84 on Advances in Cryptology, LNCS 196. Berlin: Springer-Verlag, 1985:47 -53.
  • 2AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography [ C]// Cryptology-Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003:452-473.
  • 3HUANG XIN-YI, SUSILO W, MU YI, et al. On the security of certifieateless signature schemes from Asiacrypt 2003 [ C]//Cryptology and Network Security: CANS 2005, LNCS 3810. Berlin: Springer- Verlag, 2005:13-25.
  • 4YUM D H, LEE P J. Generic construction of certificateless signature [ C]//Australasian Conference on Information Security and Privacy: ACISP 2004, LNCS 3108. Berlin: Springer-Verlag, 2004: 200 -211.
  • 5HUB C, WONG D S, ZHANG ZHEN-FENG, et al. Key replacement attack against a generic construction of certificateless signature [ C]// Australasian Conference on Information Security And Privacy: ACISP2006, LNCS4058. Berlin: Springer-Verlag, 2006:235 - 246.
  • 6ZHANG ZHEN-FENG, WONG D S, XU JING, et al. Certificateless public-key signature: Security model and efficient construction [ C]// Fourth International Conference on Applied Cryptography and Network Security: ACNS 2006, LNCS 3989. Berlin: Springer-Verlag, 2006:293-308.
  • 7GORANTLA M C, SAXENA A. An efficient certfficateless signature scheme [ C]//Proceedings of Computational Intelligence and Security: CIS 2005, LNAI 3802. Berlin: Springer-Verlag, 2005: 110- 116.
  • 8YAP W-S, HENG S-H, GOI B-M. An efficient certificateless signature scheme [ C]// Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006, LNCS 4097. Berlin: Springer-Verlag, 2006:322-331.
  • 9GOYA G H. Proposta de esquemas de criptografia e de assinatura sob modelo de criptografia de cha publica sem certificado [ EB/OL]. [ 2008 -09 -22 ]. http://www, ime. usp. br/- dhgoya./dis_denise. pdf.
  • 10CAO XUE-FEI, PATERSON K G, KOU WEI-DONG. An attack on a certificateless signature scheme: Cryptology ePrint Archive, Report 2006/367 [ R/OL]. (2006 - 10 -25) [2008 -09 - 12]. http://eprint, iacr. org/2006/367.

共引文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部