期刊文献+

基于证书的签名方案的分析与改进 被引量:1

Cryptanalysis and Improvement of Certificate-Based Signature Scheme
原文传递
导出
摘要 基于证书的密码体制结合了基于公钥基础设施的密码体制和基于身份的密码体制的优点,既简化了公钥的管理又不存在密钥托管问题,对一个无双线性对的基于证书的签名方案进行了密码学分析,指出该方案存在类型II攻击者的伪造性攻击和其证明中的不当之处,并用散列函数绑定随机数的方法对其进行了改进.改进方案在离散对数是困难问题的假设下,在最强的安全模型中被证明是安全的.由于不需要耗时的双线性对运算,新方案效率较高,适合于无线传感器网络等能量受限的系统使用. Certificate-based cryptosystem combines the merits of public key infrastructure (PKI)-based cryptosystem and identity-based cryptosystem, which can not only simplify the public key management, but also avoid the key escrow problem. A certificate-based signature scheme without pairing is analyzed, and shown to be forgeable by a type II attacker. In the proof, there exists a security flaw, which is im- proved by means of binding random number to hash function. The improved scheme is proven to be un- forgeab]e in the strongest security model of certificate-based signature scheme under discrete logarithm as- sumption. Without any time-consuming bilinear pairing operations, it shows efficient and applicable to power-constrained devices, such as wireless sensor networks.
作者 周才学
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2013年第6期98-101,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(61073176) 江西省自然科学基金资助项目(20132BAB211025) 江西省教育厅资助科研项目(GJJ13716) 九江学院校级重点课题(2013ZD02)
关键词 基于证书的签名 随机预言机模型 双线性对 离散对数假设 公钥替换攻击 certificate-based signature random oracle model bilinear pairings discrete logarithm assumption public key replacement
  • 相关文献

参考文献1

二级参考文献10

  • 1Gentry C. Certificate-based encryption and the certificaterevocation problem[ C]//Proc of Eurocrypt,03. Berlin:Springer-Verlag, 2003 : 272-293.
  • 2Girault M. Self-certified public keys [ C ]//Poc ofEurocrypt,91. Berlin: Springer-Verlag, 1991 : 490-497.
  • 3Kang B G, Park J H, Hahn S G. A certificate-basedsignature scheme [ C ] //Proc of CT-RSA 2004. Berlin :Springer-Verlag, 2004 : 99-111.
  • 4Li J, Huang X,Mu Y,et al. Certificate-basedsignature : security model and efficient construction[C ]//EuroPKI,07. Berlin: Springer-V erlag, 2007;110-125.
  • 5Wu W, Mu Y,Susilo W, et al. Certificate-basedsignatures revisited [J]. Journal of Universal ComputerScience, 2009,15(8) : 1659-1684.
  • 6Liu J K, Baek J, Susilo, et al. Certificate-basedsignature scheme without pairings or random oracles[C]//ISC,08. Berlin: Springer-Verlag, 2008 : 285-297.
  • 7Zhang J. On the security of a certificate-based signaturescheme and its improvement with pairings [ C]//Proc ofISPEC,09. Berlin: Springer-Verlag, 2009 : 47-58.
  • 8Galindo D, Garcis F D. A schnorr-like lightweightidentity-based signature scheme [ C ]//Proc ofAfricacrypt ’09. Berlin; Springer-Verlag, 2009 : 135-148.
  • 9Boldyreva A, Palacio A, Warinschi B. Secure proxysignature schemes for delegation of signing rights [ EB/OL ]. Cryptology ePrint Archive,Report 2003/096(2003),http://eprint. iacr. org/.
  • 10Bellare M,Neven G. Multi-signatures in the plainpublic-key model and a general forking lemma [ C ]//Proc of CCS '06. Alexandria: ACM , 2006 : 390-399.

共引文献5

同被引文献18

  • 1Yang G M, Tan C H, Mu Y, et a1. Identity based identification from algebraic coding theory[J]. Theoretical Computer Science, 2014, 520: 51-6l.
  • 2Zhang L, Wu Q H, Domingo-Ferrer J, et a1. Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security[J]. Information Sciences, 2014, 272: 223-237.
  • 3Gentry C. Certificate-based encryption and the certificate revocation problem[Cl// Proc of EuroCrypt, LNCS 2656, 2003: 272-293.
  • 4Huang R F, Nong Q. A new efficient certificate-based signature scheme without bilinear pairings[Cl// 2012 International Conference on Computer, Physical Mathematics and Technology, Lecture Notes in Information Technology,Vo1.31, 2012: 101-10B.
  • 5Yu Y, Mu Y, Susilo W, et a1. Security pitfalls of an efficient threshold proxy signature scheme for mobile agents[J]. Information Processing Letters, 2014, 114(1): 5-B.
  • 6Kang B G, Park J H, Hahn S G. A certificate-based signature scheme[Cl//Proc of CT-RSA. LNCS 2964, 2004: 99-11l.
  • 7Li J G, Xu L Z, Zhang Y C. Provably secure certificate-based proxy signature schemes[J]. Journal of Computers, 2009, 4(6): 444-452.
  • 8Chen J N, Huang Z J. Certificate-based proxy signature[Cl//IEEE International Conference on Progress in Informatics and Computing, 2010(1): 465-468.
  • 9Chen L, Cheng Z, Smart N P. Identity-based key agreement protocols from pairings[J]. International Journal Information Security, 2007, 6(4): 213-24l.
  • 10Boldyreva A, Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights[J]. Journal of cryptology, 2012, 25(1): 57-115.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部