期刊文献+

无证书签名方案的安全性分析与改进 被引量:3

Security analysis and improvement of certificateless signature scheme
下载PDF
导出
摘要 针对王怡等(王怡,杜伟章.无双线性对的无证书签名方案的分析及改进.计算机应用,2013,33(8):2250-2252)提出的无双线性对运算的无证书签名方案,指出该方案无法抵抗伪造性攻击,并提出改进方案。改进方案加强了签名算法中参数的关联程度,以抵抗伪造性攻击。安全性分析结果表明,在随机预言机模型下,新方案对于自适应选择消息和身份攻击是存在性不可伪造的。改进方案避开双线性对和逆运算,效率优于已有方案。 By analyzing the security of a certificateless signature scheme without bilinear pairing proposed by Wang Y, et al. (WANG Y, DU W. Security analysis and improvement of certificateless signature scheme without bilinear pairing. Journal of Computer Applications, 2013, 33(8): 2250-2252), the result that the scheme can not resist forgery attack was pointed out and an improved scheme was proposed. The improved scheme enhanced the relationship of parameters in signature algorithm to resist forgery attack. The results of security analysis show that the improved scheme is proved to be existentially unforgeable against adaptive chosen message and identity attacks in random oracle model. The improved scheme is more efficient than the existing schemes for avoiding bilinear pairings and inverse operation.
出处 《计算机应用》 CSCD 北大核心 2014年第8期2342-2344,2349,共4页 journal of Computer Applications
基金 河南省高校青年骨干教师资助计划项目(2013190) 河南省教育厅科学技术研究重点项目(14B520039) 2014年河南省科技计划项目(142102210224)
关键词 无证书签名 双线性对 离散对数问题 随机预言机模型 certificateless signature bilinear pairing discrete logarithm problem Random Oracle Model (ROM)
  • 相关文献

参考文献13

二级参考文献108

  • 1夏满民,谷利泽.一种新型的代理盲签名方案[J].北京邮电大学学报,2006,29(3):48-52. 被引量:17
  • 2张学军,王育民.高效的基于身份的代理盲签名[J].计算机应用,2006,26(11):2586-2588. 被引量:16
  • 3王天银,蔡晓秋,张建中.一种安全有效的代理盲签名方案[J].计算机工程,2007,33(2):148-149. 被引量:6
  • 4YANG Chen MA Wen-ping WANG Xin-mei.Secure mediated certificateless signature scheme[J].The Journal of China Universities of Posts and Telecommunications,2007,14(2):75-78. 被引量:4
  • 5Shamir A. Identity based cryptosystems and signature schemes//Proeeedings of the Crypto'84. California, USA, 1984:47-53
  • 6Al-Riyami S, Paterson K. Certificateless public key cryptography//Proceedings of the Asiacrypt 2003. Taipei, China, 2003:452-473
  • 7Huang X, Susilo W, Mu Y, Zhang F. On the security of a certifieateless signature scheme//Proceedings of the CANS 2005. Xiamen, China, 2005:13-25
  • 8Yap W, Heng S, Goi B. An efficient certificateless signature scheme//Proceedings of the EUC Workshops 2006. Seoul, Korea, 2006:322-331
  • 9Park J. An attack on the certificateless signature scheme from EUC Workshops 2006. Cryptology ePrint Archive, Report 2006/442, 2006
  • 10Zhang Z, Feng D. Key replacement attack on a certificateless signature scheme. Cryptology ePrint Archive, Report 2006/ 453, 2006

共引文献87

同被引文献29

  • 1SHAMIR A. Identity-Based Cryptosystem and Signature Scheme[C]//Advances in Cryptology-Crypto'84. Berlin: Springer--Ver- lag, 1984:47-53.
  • 2AL-RIYAMI S, PATERSON K G. Certifieateless Public Key Cryptography[C]//Advances in Cryptology-ASIACRYPT'03. Berlin: Springer-Verlag, 2003:452-473.
  • 3HUANG X, SUSILO W, MU Y, et al. On the security of a certificateless signature Schemes from Asia Crypt'03[C]//Proceedings of CANS'05. Berlin: Springer--Vedag, 2005:13-25.
  • 4LIU J K, AU M H, SUSILO W. Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model [C]/! Proc ACM Symposium on Information, Computer and Communications Security. New York: ACM Press, 2007:302-311.
  • 5POINTCHEVAL D, STERN J. Security Proofs for Signature Schemes[C]//Proceedings of the EUROCRYPT'96. Spain: Saragossa, 1996:387-398.
  • 6Shamir A. Identity-based eryptosystems and signature sch- emes [ C ]//Proc of CRYPTO ' 84. Santa Barbara: Springer, 1985:47-53.
  • 7Gutmann P. PKI : it' s not dead, just resting [ J ]. Computer, 2002,35(8) :41-49.
  • 8A1-Riyami S S,Paterson K G. Certificateless public key cryp- tography[ C ]//Prec of ASIACRYPT. Berlin: Springer, 2003 : 452 -473.
  • 9Huang X, Susilo W, Mu Y,et al. On the security of certificate- less signature schemes from Asiacrypt 2003 [ C ]//Proc of CANS. [ s. 1. ]:[ s. n. ] ,2005:13-25.
  • 10Yum D H, Lee P J. Generic construction of certificateless sig- nature[ C]//Proc of 9th conf on information security and pri- vacy. Is. 1. ]: [ s. n. ] ,2004:200-211.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部