期刊文献+

一个高效的无证书签名方案分析与改进 被引量:4

Analysis and Improvement of an Efficient Certificateless Signature Scheme
下载PDF
导出
摘要 对一种基于双线性对的高效无证书签名方案进行安全性分析,表明该方案对于公钥替换攻击和恶意的密钥生成中心攻击是不安全的。提出了一种可避免这些攻击的改进方案。在随机预言机模型、离散对数问题和计算Diffie-Hellman问题困难性假设下,证明了改进方案可以抵抗自适应选择消息攻击的存在性伪造。与其他基于双线性对的无证书签名方案相比,改进方案具有较高的计算效率。 Security analysis of an efficient certificateless signature scheme based on bilinear pairing shows that the scheme is insecure against public key replacement attack and malicious key generation center( KGC)attack. An improved scheme to avoid these attacks was proposed. The scheme was proved that the existential forgery of an adaptive chosen message attacks can be resisted in the random oracle model,the assumption of discrete logarithm problem( DLP) and computational Diffie-Hellman problem( CDHP). Compared with other certificateless signature schemes based on bilinear pairing,the improved scheme has better computational efficiency.
出处 《河南科技大学学报(自然科学版)》 CAS 北大核心 2014年第4期49-53,7,共5页 Journal of Henan University of Science And Technology:Natural Science
基金 四川省应用基础计划基金项目(2012JY0033) 国土资源部地学空间信息技术重点实验室开放基金项目(KLGSIT201308) 四川省杰出青年学科带头人培养计划基金项目(06ZQ026-014) 四川省教育厅自然科学重点基金项目(2006A116)
关键词 无证书签名 双线性对 公钥替换攻击 恶意密钥生成中心攻击 离散对数问题 计算 DIFFIE-HELLMAN 问题 certificateless signature bilinear pairing public key replacement attack malicious KGC attack discrete logarithm problem(DLP) computational Diffie-Hellman problem(CDHP)
  • 相关文献

参考文献17

二级参考文献94

  • 1CAO Chunjie,MA Jianfeng,MOON Sangjae.Provable Efficient Certificateless Group Key Exchange Protocol[J].Wuhan University Journal of Natural Sciences,2007,12(1):41-45. 被引量:8
  • 2Shamir A. Identity based cryptosystems and signature schemes//Proeeedings of the Crypto'84. California, USA, 1984:47-53
  • 3Al-Riyami S, Paterson K. Certificateless public key cryptography//Proceedings of the Asiacrypt 2003. Taipei, China, 2003:452-473
  • 4Huang X, Susilo W, Mu Y, Zhang F. On the security of a certifieateless signature scheme//Proceedings of the CANS 2005. Xiamen, China, 2005:13-25
  • 5Yap W, Heng S, Goi B. An efficient certificateless signature scheme//Proceedings of the EUC Workshops 2006. Seoul, Korea, 2006:322-331
  • 6Park J. An attack on the certificateless signature scheme from EUC Workshops 2006. Cryptology ePrint Archive, Report 2006/442, 2006
  • 7Zhang Z, Feng D. Key replacement attack on a certificateless signature scheme. Cryptology ePrint Archive, Report 2006/ 453, 2006
  • 8Choi K, Park J, Hwang J, Lee D. Efficient certificateless signature schemes//Proceedings of the ACNS 2007. Zhuhai, China, 2007:443-458
  • 9Castro R, Dahab R. Two notes on the security of certificateless signatures//Proceedings of the ProvSec 2007. Wollongong, Australia, 2007:85-102
  • 10Zhang J, Mao J. Security analysis of two signature schemes and their improved sehemes//Proceedings of the ICCSA 2007. Kuala Lumpur, Malaysia, 2007:589-602

共引文献129

同被引文献52

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2FAROUGHIAN F F, KALAFATIS S P, LEDDEN L, et al. Value and risk in business-to-business e-bank- ing[J]. Industrial Marketing Management, 2012, 41 (1) : 68-81.
  • 3FIORDELISI F, MARQUESIBANEZ D, MOLY- NEUX P. Efficiency and risk in European banking[J]. Journal of Banking Finance, 2011, 35 (5) : 1815- 1326.
  • 4LEE J R, RAO S, NASS C. et al. When do online shoppers appreciate security enhancement efforts.9 Effects of financial risk and security level on evalua- tions of customer authentication [J]. International Journal of Human-Computer Studies, 2012, 70 (5) : 364-376.
  • 5BONEH D, FRANKLIN M. Identity based encryptior from the weil pairing [C-]//Advances in Cryptology- Crypto" 01, LNCS 2139. Berlin: Springer-Verlag, 2001 : 213-229.
  • 6DING Xuhua,TSUDIK G.Simple identity based cryp- tography with mediated RSA[C]// The Cryptogra- phers Track RSA Conference 2003, LNCS 2612. Ber- lin: Springer-Verlag, 2003: 193-210.
  • 7BONEH D, DING Xuhua,TSUDIK G, et al. A meth- od for fast revocation of public key certificates and se- curity capabilities[-C-]//Proceedings of 10th USENIX Security Symposium, Washington, D.C., USA: USE- NIX, 2001.
  • 8ELASHRY I, MU Y, SUSILO W. Identity-based me- diated RSA revisited[-C]//Melbourne: 12th IEEE In- ternational Conference on Trust, Security and Privacy in Computing and Communications, 2013 : 728-735.
  • 9DARWISH S M, HASSAN A M, A model to authen- ticate requests for online banking transaction[J]. Alex- andria Engineering Journal, 2012, 51(3):185-191.
  • 10RAJALAKSHMI S, SRIVATSA S K. Identity-based encryption using mRSA in electronic transactions[J], Information Technology Journal, 2007,6 (3) : 435-440.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部