期刊文献+

一个无证书签密方案的安全性分析 被引量:1

Cryptanalysis of a Certificateless Sgncryption Scheme
下载PDF
导出
摘要 对周敏等人提出的无证书签密方案进行了安全性分析,指出该方案存在以下安全缺陷:方案不能抵抗不可区分性选择明文攻击;利用公钥替换攻击,敌手可以伪造用户对任意消息的签密;恶意KGC可以对任意消息伪造签密,也可以对任意签密文进行解密;对消息的加解密密钥不含随机因子,使得方案不具有前向安全性. Cryptanalysis of the certificateless verifiable signcryption scheme proposed by Zhou Min et al shows that the scheme has the following security flaws: the scheme can’t resist indistinguishability under the chosen ciphertext attack;the adversary can forge a valid signcryption ciphertext for any message of any user under public key replacement attacks;the malicious KGC can forge the ciphertext for any message and can also decrypt any ciphertext;the scheme is not forward-secure because the encryption key does not contain a random number.
出处 《信阳师范学院学报(自然科学版)》 CAS 北大核心 2013年第3期436-438,共3页 Journal of Xinyang Normal University(Natural Science Edition)
基金 国家自然科学基金项目(61272465) 河南省自然科学基金项目(122400550189) 河南省教育厅科学技术研究重点资助项目(12A520034)
关键词 签密 无证书密码体制 前向安全性 语义安全性 不可伪造性 公钥替换攻击 signcryption certificateless cryptography forward security semantic security unforgeability public key replacement attacks
  • 相关文献

参考文献9

  • 1Shamir A. Identity-based etyptosystems and slgnature schemes [ C ]//Advances in C ptolo -Crypto'84, LNCS 196, Berlin t Sprlnger-Verlag, 1984:47-53.
  • 2Al-riyami S S, Paterson K G. Cert eateless public key cryptography[ C ]//ASIACRYPT03, LNCS 2894. Berlin,. Springer-Verlag, 2003:452- 473.
  • 3Zheng Y L. Digital slgncryptlon or how to achieve cost ( signature & encryption ) < < cost (signature) + cost (encryption) [ C ]//Advances in Cryptology-CRYPTO97, LNCS 1294. Berlin: Springer-Verlag, 1997:165-179.
  • 4Barbesa M, Farshim P. Certifieateless signcryption[ C] // Proceedings of the 2008 ACM Symposium on Information, Computer and Communica- tions Security. New York: ACM, 2008:369-372.
  • 5Selvi S S D, Vivek S S, Rangan C P. Cryptanalysis of certificateless sigacryption schemes and an efficient construction without pairing[ C ]//Pro- ceedings of the Inscrypt 2009, LNCS 6151. Berlin: Spfinger-Verlag, 2010:75-92.
  • 6Liu Z H, Hu Y P, Zhang X S, et al. Certificateless sigacryption scheme in the standard model [ J ]. Information Science, 2010,180 (3) :452- 464.
  • 7Selvi S S D, Vivek S S, Rangan C P. Security weaknesses in two cettificateless signcryption schemes [EB/OL]. (2010-O2-20) [2012-11-15]. http ://eprint. iacr. org/2010/092.
  • 8刘文浩,许春香.无双线性配对的无证书签密方案[J].软件学报,2011,22(8):1918-1926. 被引量:59
  • 9周敏,姚金涛,万军洲,巫莉莉.无证书的可验证签密方案[J].华南农业大学学报,2011,32(4):110-112. 被引量:1

二级参考文献22

  • 1张串绒,肖国镇.一个可公开验证签密方案的密码分析和改进[J].电子学报,2006,34(1):177-179. 被引量:16
  • 2ZHENG Yu-liang. Digital signcryption or how to achieve cost( signature & encryption) ≤ cost (signature) + cost (encryption) [J], LNCS, 1997(1294) :165-179.
  • 3FENG Bao, ROBERT H D. A signcryption scheme with signature directly verifiable by public key [ J ]. LNCS, 1998( 1431 ) :55-59.
  • 4LEE M K, KIM D K, PARK K. An authenticated encryp- tion scheme with public verifiability [ M ] //Anon. 5th Japan Korea Joint Workshop on Algorithms and Computa- tion. Tokyo : IEEE,2000 : 49-56.
  • 5HORSTER P, MICHELS M, PETERSEN H. Authentica- ted encryption schemes with low communication costs[J]. Electronics Letters, 1994,30( 15 ) : 1212-1213.
  • 6MALONE-LEE J. Identity based signcryption[ EB/OL], [ 2010-08-20 ]. http ://eprint. iacr. org/2002/098, pdf.
  • 7RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems [J]. Communications of the ACM, 1978, 21 (2) : 120- 126.
  • 8SHAMIR A. Identity based cryptosystems and signature schemes[ J]. LNCS, 1985 (196) :47-53.
  • 9AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[J]. LNCS,2003 (2894):452-473.
  • 10LEE Y R, LEE H S. An authenticated certificateless pub- lic key encryption scheme [ J ]. Information Center for Mathematical Sciences ,2005,8 ( 1 ) : 177-187.

共引文献58

同被引文献15

  • 1ZHENG Y L. Digital signcryption or how to achieve cost( signature & encryption) << cost(signature) plus cost(encryption) [ C] //Advances in Cryptology-CRYPTO' 97, LNCS 1294. Berlin: Springer-Verlag, 1997 : 165-179.
  • 2SHAMIR A. Identity-based cryptosystems and signature schemes [ C ] // Advances in Cryptology-CRYPTO' 84, LNCS 196. Berlin : Springer-Ver- lag, 1984, 47-53.
  • 3AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[ C ]//Advances in Cryptology-ASIACRYPT' 03, LNCS 2894. Ber- lin: Springer- Verlag, 2003, 452-473.
  • 4BARBOSA M, FARSHIM P. Certificateless signcryption [ C ]//Proceedings of the 2008 ACM Symposium on Information, Computer and Commu- nications Security. New York: ACM, 2008, 369-372.
  • 5ARANHA D, CASTRO R, LOPEZ J, et al. Efficient certifieateless signcryption[ EB/OL]. (2010-05-12) [ 2014-03-15 ]. http ://sbseg2008.inf. ufrgs.br/proeeedings/data/pdf/st03 01 resumo.pdf.
  • 6WU C H, CHEN Z X. A new efficient eertificateless signeryption scheme[ C]//Proceedings of ISISE' 2008, 2008: 661-664.
  • 7SHARMILA D S, VIVEK S S, PANDU R C. On the security of eertificateless signeryption schemes [ R ]. Cryptology ePRint Archive : Report 2009/298. 2009. http://epRint.iacr.org/2009/298.
  • 8SELVI S S D, VIVEK S S, RANGAN C P. Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing [ C ]//Proceedings of the Inscrypt 2009, LNCS 6151. Berlin: Springer- Verlag, 2010, 75-92.
  • 9POINTCHEVAL D, STERN J. Security arguments for digital signatures and blind signatures [ J ]. Journal of Cryptology, 2000, 13 (3) : 361- 396.
  • 10朱辉,李晖,王育民.不使用双线性对的无证书签密方案[J].计算机研究与发展,2010,47(9):1587-1594. 被引量:47

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部