摘要
对Hafizul等提出的无证书强指定验证者签名方案进行安全分析,指出该方案不能抵抗授权攻击和恶意但被动的KGC(Key Generation Center)的普遍伪造攻击。同时也指出了另外一个缺陷,即不仅指定验证者的私钥可以验证签名,而且签名者的私钥也可以验证签名。提出改进的方案,改进方案克服了原方案的安全缺陷,提高了系统的安全性。
We make the security analysis on the certificateless strong designated verifier signature scheme proposed by Hafizul et al.,andpoint out that the scheme can’t resist to the delegatability attack and to universal forgeability attack by malicious-but-passive KGC (keygeneration centre).Moreover,we point out another bug,that is,the signature can be verified not only with the designated verifier’s secretkey but also with the signer’s secret key.The improved scheme is proposed,it overcomes the security flaws of original scheme and enhancesthe security of the system.
出处
《计算机应用与软件》
CSCD
北大核心
2014年第9期283-287,308,共6页
Computer Applications and Software
基金
湖北省教育厅科学技术研究项目(Q2111113)
武汉科技大学冶金工业过程系统科学湖北省重点实验开放基金资助项目(Y201315
Y201118)
关键词
指定验证者签名
授权攻击
伪造攻击
Designated verifier signature
Delegatability attack
Forgeability attack