期刊文献+

两个无证书签名方案的密码分析

CRYPTANALYSIS OF TWO CERTIFICATELESS SIGNATURE SCHEMES
下载PDF
导出
摘要 无证书密码学不需要使用证书,也没有密钥托管问题,是目前的一个研究热点。最近,有学者分别提出了一种高效的无证书签名方案。通过对这两个方案进行分析,指出这两个方案都不满足存在不可伪造性。证明这两个方案对于公钥替换攻击是不安全的,即敌手通过替换用户的公钥可以伪造该用户对任意消息的签名,并给出了详细的攻击过程。 Certificateless cryptography does not need to use certificates and does not suffer from key-escrow problem. Therefore, certificateless cryptography has received much more attention. Recently, Some scholars proposed an efficient certificateless signature scheme respectively. In this paper, we analyse these two schemes and show that neither of them satisfies the property of being unforgeability. We also prove that these two schemes are insecure on replacement attacks against the public key. That is, an adversary could forge a signature for any message of any user by substituting the public key of the user. We also describe the attacking process in detail.
作者 吴挺
出处 《计算机应用与软件》 CSCD 北大核心 2013年第6期316-317,328,共3页 Computer Applications and Software
关键词 密码分析 无证书签名 公钥替换攻击 Cryptanalysis Certificateless signature Public key replacement attacks
  • 相关文献

参考文献7

二级参考文献29

  • 1田捷,李亮,杨鑫.Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment[J].Journal of Computer Science & Technology,2006,21(5):861-870. 被引量:6
  • 2李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 3Shamir A. Identity based cryptosystems and signature scheme[ C]. In ptoe. of CRYPTO' 84, LNCS, Vol. 196, Springer-Verlag. 1984:47 -53.
  • 4Boneh D,Boyen X. Secure identity based encryption without random oracles[ C]. Advances in Cryptology-Crypt' 04, LNCS, Vol. 3152, Springer-Verlag. 2004:443 - 459.
  • 5Cheng X,Zhu H, Wang X. Efficient group signatures from bilinear pairing[ C]. SKLOIS Conference on Information Security and Cryptography (CISC 2005), LNCS, Vol. 3822, Springer-Verlag. 2005:128 - 139.
  • 6Baek J,Zheng Y. Identity-based threshold decryption[ C]. In proc. of Practice and Theory in Public Key Cryptography-PKC 2004, LNCS, Vol. 2947, Springer-Verlag. 2004:248 - 261.
  • 7Al-Riyami S S, Paterson K G. Certificateless public key cryptography. In proc. of Asiacrypto' 03, LNCS, Vol. 2894, Springer-Verlag. 2003 : 452 - 473.
  • 8Baek J,Safavi-Nani R,Susilo W. Certificateless public key eneryption without pairing[ C]. In proc. of ISC 2005, LNCS, Vol. 3650, Springer-Verlag. 2005 : 134 - 148.
  • 9Cheng Z, Comley R. Efficient certifiteless public key encryption [ R ]. Cryptology eprint Archive, Report 2005/012, http://eprint. iacr. org/ 2005/012.
  • 10Ju H S,Kim D Y,Lee W H. Efficient revocation of security capability in certificateless public key cryptography[ C]. In proc. of KES 2005, LNAI, Vol. 3682, Springer-Verlag. 2005:453 -459.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部