期刊文献+

对一个无证书代理盲签名方案的分析与改进 被引量:4

Analysis and improvement of a certificateless proxy blind signature
下载PDF
导出
摘要 通过对葛荣亮等人提出的无证书代理盲签名方案进行分析,从中发现该方案会引起公钥替换攻击和恶意但是被动的KGC攻击。为了解决此方案的安全性缺陷,提出了一种改进方案。分析表明,改进的新方案满足无证书代理盲签名方案的所有安全性要求,并且拥有与原方案相同的计算效率。 Through the cryptanalysis of a certificateless proxy blind signature scheme proposed by Ge Rong-liang, it find that this scheme can cause the public replacement attack and malicious-but-passive KGC attack. To avoid these attacks, this paper proposed a new improved scheme. Analysis result shows that the new improved shceme satisfies the requirements of proxy blind signature scheme and has the same computational efficiency compared with the original scheme.
出处 《计算机应用研究》 CSCD 北大核心 2014年第2期540-542,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(11261060) 福建省自然科学基金资助项目(2012J01022) 新疆研究生科研创新资助项目(XJGRI2013130)
关键词 无证书公钥密码体制 代理盲签名 公钥替换攻击 恶意但是被动的KGC攻击 双线性对 certificateless public key cryptography proxy blind signature public key replacement attack malicious-but-pas- sive KGC attack bilinear pairings
  • 相关文献

参考文献14

  • 1AL-RIYAMI S, PATERSON K. Certificateless public key cryptogra- phy [ M ]//Advances in Cryptology-ASIACRYPT. Berlin: Springer- Verlag,2003:452-473.
  • 2MAMBOM,USUDAK,OKAMOTOE.Proxysignaturesfordelegatingsigningoperation[C]//Procofthe3rdACMConferenceonComputerandCommunicationsSecurity.NewYork:ACMPress,1996:48-57.
  • 3MAMBOM,USUDAK,OKAMOTOE.Proxysignatures:delegationofthepowertosignmessages[J].IEICETransonFundamentalsofElectronics,CommunicationsandComputerSciences,1996,79(9):1338-1354.
  • 4CHAUM D.Blindsignaturesforuntraceablepayments[C]//AdvancesinCryptology.1982:199-203.
  • 5LINW D,JANJK.Asecuritypersonallearningtoolsusingaproxyblindsignaturescheme[C]//ProcofInternationalConferenceonChineseLanguageComputing.2000:273-277.
  • 6VERMAGK.Aproxyblindsignatureschemeoverbraidgroups[J].InternationalJournalofNetworkSecurity,2009,9(3):214-217.
  • 7HEDebiao,CHENJianhua,HUJin.AnIDbasedproxysignatureschemeswithoutbilinearpairings[J].AnnalsofTelecommunications,2011,66(11-12):657-662.
  • 8SUNYing,XUC,YUY,etal.Improvementofaproxymultisignatureschemewithoutrandom oracles[J].ComputerCommunications,2011,34(3):257-263.
  • 9LIX,CHENK,SUNL.Certificatelesssignatureandproxysignatureschemesfrombilinearpairings[J].LithuanianMathematicalJournal,2005,45(1):76-83.
  • 10LUR,HED,WANGC.Cryptanalysisandimprovementofacertificatelessproxysignatureschemefrombilinearpairings[C]//Procofthe8thACISInternationalConferenceonSoftwareEngineering,ArtificialIntelligence,Networking,andParallel/DistributedComputing.2007:285-290.

二级参考文献13

  • 1夏满民,谷利泽.一种新型的代理盲签名方案[J].北京邮电大学学报,2006,29(3):48-52. 被引量:17
  • 2张学军,王育民.高效的基于身份的代理盲签名[J].计算机应用,2006,26(11):2586-2588. 被引量:16
  • 3王天银,蔡晓秋,张建中.一种安全有效的代理盲签名方案[J].计算机工程,2007,33(2):148-149. 被引量:6
  • 4SHAMIR A. Identity-based cryptosystems and signature schemes[C] // Proceedings of CRYPTO 84,LNCS 196.Berlin:SpringerVerlag,1985:7-53.
  • 5AL-RIYAMI S S,PATERSON K G.Certificateless public key cryptography[C] //Proceedings of Asiacrypt 2003,LNCS 2894.Berlin:Spring-Verlag,2003:452-473.
  • 6MAMBO M,USUDA K,OKAMOTO E.Proxy signature:Delegation of power to sign messages[J].IEICE Transactions on Fundamentals,1996,E79-A(9):1338-1353.
  • 7CHAUM D.Blind signature for untraceable payments[C] // Adavances in Cryptology:Crypto82. Berlin: Springer-Verlag, 1982:199-203.
  • 8LI J G,WANG S H.New efficient proxy blind signature scheme using verifiable self-certified public key[J].International Journal of Network Security,2007,4(2):193-200.
  • 9Bessie C. Hu,Duncan S. Wong,Zhenfeng Zhang,Xiaotie Deng. Certificateless signature: a new security model and an improved generic construction[J] 2007,Designs, Codes and Cryptography(2):109~126
  • 10陈逢林,胡万宝.基于超椭圆曲线的代理盲签名方案[J].计算机应用,2010,30(5):1224-1226. 被引量:4

共引文献11

同被引文献25

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部