期刊文献+

一个无证书强指定验证者签名方案的安全性分析与改进

Security Analysis and Improvement of Certificateless Strong Designated Verifier Signature Scheme
下载PDF
导出
摘要 Hafizul Islam SK和G.P.Biswas最近基于椭圆曲线双线性对提出一个无证书强指定验证者签名方案,并声称该方案在三类敌手攻击模型下是可证明安全的,即第一类只得到系统公开参数和公钥的敌手,第二类可替换签名和验证者公钥的敌手,第三类可得到系统主密钥的敌手。分析该强指定验证者签名方案不能抵抗第三类敌手的攻击,亦即第三类敌手可以伪造有效的签名。针对此缺陷,对该无证书强指定验证者签名方案做了改进,在改进方案中,验证者的秘密私钥(由参与者独立产生的私钥)参与签名的验证计算,因此有效避免了原有方案的安全缺陷。最后对改进方案作了安全性分析,说明改进方案确实能抵抗三类敌手的攻击。 Hafizul Islam SK and G. P. Biswas recently proposed a certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairing, and claimed their scheme satisfies provable security against three types of adversaries, including the type 1 adversary who only learns the system public parameters, the type 2 adversary who can't obtain the private key of the user and the system master key, but can replace the user's public key, and the type 3 ad- versary who has obtained the system master key. However, this paper pointed out their signature scheme is actually not secure as claimed by presenting an attack launched by an adversary who has learned the system master key. Further- more, to make up this flaw, we also provided an revised certificateless strong designated verifier signature scheme in which the verifier' s partial private key generated by himsdf is included in the computation of the verification procedure, thus above attack can be efficiently resisted.
出处 《计算机科学》 CSCD 北大核心 2013年第7期126-128,166,共4页 Computer Science
基金 四川省科技支撑计划项目(2012GZ0001) 四川师范大学科研项目(13KYL06) 上海市科学技术委员会基金项目(11511505300)资助
关键词 无证书的公钥密码系统 强指定验证者签名 双线性对 Certificateless public key cryptosystem,Strong designated verifier signature, Bilinear pairing
  • 相关文献

参考文献18

  • 1Diffie W, Hel|man M. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6) : 644-654.
  • 2Shamir A. Identity based cryptosystems and signature scheme [C] // Crypto 1984, LNCS. vol. 196, Springer-Verlag, 1984: 47- 53.
  • 3Miller V S. Use of elliptic curves in cryptography [C]//Procee- ding of the Crypto' 85. New York: Springer-Verlag, 1985: 417- 426.
  • 4Koblitz N. Elliptic curve cryptosystem [J]. Journal of Mathema- tics of Computation,1987,48(177) :203-209.
  • 5Boneh D, Franklin M K. Identity-based encryption from the Weil pairing[C] // Proceedings of the Crypto' 01, LNCS. vol. 2139, Springer-Verlag, 2001 : 213-229.
  • 6A1-Riyami S, Paterson K. Certificateless public key cryptography [C]// Proceedings of the Asiacrypt' 03, LNCS. vol. 2894, Springer-Verlag, 2003 : 452-473.
  • 7J akobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications [C] // Proceedings of the Eurocrypt 96, LNCS. vol. 1070, Springer-Verlag, 1996 : 143-154.
  • 8Yang M, Shem X-Q, Wang Y-NL Certificateless universal desig- nated verifier signature scheme[J]. The Journal of China Uni- versities of Posts and Telecommunications,2007,14(3):85-94.
  • 9Guozheng H, Fan H. Attacks against two provably secure eertifi- careless signature schemes[C] // Proceedings of the WASE In- ternational Conference on Information Engineering. 2009: 246- 249.
  • 10Huang X, Susilo W, Mu Y, et al. Certifieateless designated veri- fier signature sehemes[C]//Proceedings of the 20th Interna- tional Conference on AINA06. vol. 2,2006:15-19.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部