期刊文献+

几个无证书签密方案的密码分析与改进 被引量:2

Cryptanalysis and improvement of some certificateless signcryption schemes
下载PDF
导出
摘要 无证书密码体制既能避免基于身份的密码体制中存在的密钥托管问题,又能简化公钥证书的管理,具有巨大的优越性。对四个无证书签密方案进行了密码分析,指出有两个方案存在保密性攻击,有三个方案存在伪造性攻击。使用签名部分绑定接收者、加密部分绑定发送者和增加随机数的方法,分别对它们进行了改进。在随机预言机模型中,对改进方案进行了安全性证明,表明改进方案是安全的。 Certificateless cryptography eliminates the key escrow problem inherent in identity based cryptosystems, and simplifies the certificate management in the traditional public key cryptosystem, which has great superiority. Four certificateless signcryption schemes were analyzed, which shows there exist confidentiality attacks in two schemes and forgeability attacks in three schemes. The four schemes were improved by using the methods of binding receiver in signature part, binding sender in encryption part and including random number in signcryption part respectively. Finally, the improved schemes were proved in the random oracle model, and it shows the improved schemes are secure.
作者 周才学
出处 《计算机工程与科学》 CSCD 北大核心 2013年第8期69-76,共8页 Computer Engineering & Science
基金 江西省教育厅科技项目(GJJ12614)
关键词 无证书签密 保密性攻击 伪造性攻击 公钥替换攻击 随机预言机模型 certificateless signcryption confidentiality attacks forgeability attacks public key re-placement attacks random oracle model
  • 相关文献

参考文献5

二级参考文献54

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2Zheng Y.Digital signcryption or how to achieve cost(signature & encryption ) ( cost ( signature ) +cost ( encryption ) ) [C]//Proceedings of the CRYPTO'97,1997: 165-179.
  • 3Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//Proceedings of the ASIACRYPT 2003,2003:452-473.
  • 4Barbosa M,Farshim P.Certificateless signcryption[EB/OL].(2008). http ://eprint.iacr.or-g/2008/143.pdf.
  • 5Libert B,Quisquater J J.Improved signcryption from q-Diffie-Hetlman problems[C]//Proceedings of the Security Communication Networks SCN'04,2005 : 220-234.
  • 6Ma C.Efficient short signcryption scheme with public verifiability[C]// Proceedings of the Inscrypt 2006,2006:118-129.
  • 7Tan C H.Security analysis of signcryption scheme from q-Diffie- Hellman problems[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2006:206-208.
  • 8Zhang J H,Mao J.Security analysis of two signature schemes and their improved schemes[C]//Proceedings of the ICCSA 2007,2007: 589-602.
  • 9Cheng Z,Nistazakis M,Comley R,et al.On the indistinguishability-based security model of key agreement protocols-simple cases [EB/OL]. ( 2005 ).http ://eprint.iacr.org/2005/129.pdf.
  • 10Shamir A.Identity-based cryptosystems and signature schemes[C]//LNCS 196:Advances in Cryptology-CRYPTO'84.Berlin:Springer-Verlag,1984:47-53.

共引文献15

同被引文献23

  • 1Zheng Y L.Digital signcryption or how to achieve cost(signature and encryption)<>(1997)[C]//Proceedings of Cryptology-Crypto’97,LNCS 1294.Beilin:Springer-Verlag,1997:165-179.
  • 2Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//Proceedings of Asiacrypt 2003,LNCS2894.Berlin:Springer-Verlag,2003:452-473.
  • 3Fan C J,Sun W,Huang V.Provably secure randomized blind signature scheme based on bilinear pairing[J].Computers and Mathematics with Applications,2010,60(2):285-293.
  • 4Xie W J,Zhang Z.Certificateless Signcryption without Pairing[EB/OL].[2010-06-20].http://eprint.iacr.org/2010/187.
  • 5Schnorr C P.Efficient identification and signatures for smart cards[C]//Proceedings of Cryptology-Crypto’89,LNCS 435.Berlin:Springer-Verlag,1990:139-252.
  • 6Schnorr C P.Efficient signature generation by smart cards[J].Journal of Cryptology,1991,4:161-174.
  • 7Poibtcheval D,Stern J.Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13:361-396.
  • 8ZHENG Y L. Digital signcryption or how to achieve cost( signature & encryption) << cost(signature) plus cost(encryption) [ C] //Advances in Cryptology-CRYPTO' 97, LNCS 1294. Berlin: Springer-Verlag, 1997 : 165-179.
  • 9SHAMIR A. Identity-based cryptosystems and signature schemes [ C ] // Advances in Cryptology-CRYPTO' 84, LNCS 196. Berlin : Springer-Ver- lag, 1984, 47-53.
  • 10AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[ C ]//Advances in Cryptology-ASIACRYPT' 03, LNCS 2894. Ber- lin: Springer- Verlag, 2003, 452-473.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部